<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/chris-goettl/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</link><item><guid isPermaLink="false">711f25e0-6f5d-47f9-a133-fa4743219329</guid><link>https://www.ivanti.com/en-gb/blog/april-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>April 2026 Patch Tuesday</title><description>&lt;p&gt;The lead up to Patch Tuesday has been interesting. We had a Google Chrome zero-day (CVE-2026-5281) that was patched on April 1, an Adobe Acrobat Reader zero-day (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) late in the day on Friday April 10, and several older CVEs that were added to the CISA KEV list yesterday (&lt;a href="https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;April 13&lt;/a&gt;). All of this amidst a lot of industry buzz about Anthropic Mythos and &lt;a href="https://www.anthropic.com/glasswing" rel="noopener" target="_blank"&gt;Project Glasswing&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;What is the correlation between these events and Project Glasswing you ask? Most of the discussions around Mythos have been focused on where it will be used and the ramifications.&lt;/p&gt;

&lt;p&gt;Finding exploitable flaws in code can be a powerful tool for good when used by the vendor writing the code before it is released. However, it will also be used by researchers and threat actors to find flaws in code that is already released and that is where my speculation is directed.&lt;/p&gt;

&lt;p&gt;Consider the knock-on effects of a massive model like Mythos and what it will mean near term and longer term for the software that companies consume. Near term you will have the big players using a solution like this to release more secure code. As researchers and threat actors adopt more robust AI models to identify exploitable flaws this will result in more coordinated disclosures (good), zero-day exploits (bad) and n-day exploits (bad). All of this will result in more frequent, and more importantly, urgent software updates.&lt;/p&gt;

&lt;p&gt;Many organisations currently struggle to keep up with priority updates resolving exploited vulnerabilities when they occur outside of their normal monthly maintenance. I suspect most organisations were not aware of the Adobe Acrobat zero-day exploit until the CISA KEV update yesterday. This means that threat actors had another 2-3 days of free reign to exploit CVE-2026-34621 before most organisations became aware and many of those organisations will likely handle the update as part of their regular maintenance that is starting today on Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Browser security updates are a weekly occurrence. Many other applications that users are utilising regularly release updates on a continuous cadence, not a set monthly release date. This means many of the user targeted exploits are going to occur in software that is releasing outside of the average organisations maintenance schedules and that frequency is about to increase. It is hard to say if that increase is going to be 1.5x or 5x, but rest assured that the increase will be noticeable and will exacerbate a challenge that most organisations already struggle with – timely patch management.&lt;/p&gt;

&lt;p&gt;Enter Exposure Management. This is really a mindset and maturity change as much as a technology evolution. The mindset change requires us to consider a world where we need to make the decisions up front and monitor those decisions. This is called defining your Risk Appetite and monitoring your Risk Posture. Doing this effectively matures an organisations’ response to risks and makes remediation activities much more clear cut.&lt;/p&gt;

&lt;p&gt;The technology evolution requires the traditional vulnerability assessment technologies to integrate into a broader ecosystem where asset visibility or system of record comes together with vulnerability assessment and vulnerability intelligence solutions to refine when risks require more immediate action vs waiting for your regular maintenance activities to occur. Most important is the need for this tech stack to be integrated with your AEM (Autonomous Endpoint Management) platform as this is where remediation predominantly (and automatically) occurs.&lt;/p&gt;

&lt;p&gt;Now, back to our regularly scheduled Patch Tuesday update. Microsoft has resolved 169 CVEs this month which is a massive patch Tuesday lineup. April Patch Tuesday is the second-largest Patch Tuesday on record behind the October 2025 Patch Tuesday which resolved 175 CVEs. The lineup includes one zero-day exploit (CVE-2026-3220) and one public disclosure (CVE-2026-33825) and breaks down into 8 Critical, 156 Important, 3 Moderate and 1 Low severity.&lt;/p&gt;

&lt;p&gt;The zero-day CVE is in Microsoft SharePoint and the public disclosure is in Microsoft Defender making those two updates the most urgent for this month in addition to the Adobe Acrobat and Google Chrome updates leading up to Patch Tuesday.&lt;/p&gt;

&lt;h2&gt;Microsoft’s known exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Server Spoofing Vulnerability in Microsoft SharePoint (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 6.5, but it has been confirmed to be exploited in the wild. An attacker who successfully exploits this vulnerability can view sensitive information and make changes to the disclosed information. The vulnerability affects SharePoint server Subscription Edition, SharePoint Server 2019 and SharePoint Server 2016. A risk-based prioritisation methodology warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege Vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener" target="_blank"&gt;CVE-2026-33825&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but has been publicly disclosed. The CVE lists exploit code maturity as Proof-of-Concept which puts this at a higher risk of exploitation. An attacker could use this vulnerability to allow an authorised attacker to elevate their privileges to SYSTEM on the local machine.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for April. The update affects Ivanti Neurons for ITSM and resolves two CVEs. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/blog/april-2026-security-update"&gt;April Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released twelve updates this month, eleven of which released on Patch Tuesday and the zero-day update for Acrobat that released on Friday, April 10. 54 CVEs were resolved with a breakdown of 39 Critical, 13 Important and 2 Moderate. APSB26-43 resolved the zero-day exploit (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;April update to-do list&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe Acrobat (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) and Google Chrome (CVE-2026-5281) each had zero-day exploits leading up to Patch Tuesday. Ensure that you are prioritising remediation of these two products to the latest version.&lt;/li&gt;
	&lt;li&gt;Microsoft SharePoint includes a zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;) and should be investigated as a priority especially if you have known update challenges with your SharePoint environments.&lt;/li&gt;
	&lt;li&gt;The Microsoft Windows OS update this month resolves 133 CVEs (depending on edition) and includes 4 Critical CVEs. This update will resolve a significant number of findings across your environment.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Apr 2026 22:51:36 Z</pubDate></item><item><guid isPermaLink="false">083e13be-f265-4f38-ae62-7545d4004aae</guid><link>https://www.ivanti.com/en-gb/blog/march-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>March 2026 Patch Tuesday</title><description>&lt;p&gt;March Patch Tuesday resolves 79 CVEs, of which three are Critical and 76 are Important. There are two publicly disclosed CVEs this month, but none exploited. Microsoft has also released an Edge update resolving nine Chrome CVEs. The public disclosures include a Denial-of-Service vulnerability in .Net and an Elevation of Privilege vulnerability in SQL Server. Both disclosures are listed as Unproven for Exploit Code Maturity indicating the disclosures did not include any code samples.&lt;/p&gt;

&lt;p&gt;Adobe and Mozilla have released updates as part of the March Patch Tuesday including eight updates from Adobe resolving a total of 80 CVEs, 21 of which are rated Critical. Mozilla Firefox 148.0.2 released resolving three high severity CVEs.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerability&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in SQL Server (CVE-2026-21262). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker who successfully exploited this vulnerability could gain SAL sysadmin privileges. The vulnerability affects SQL Server 2016 and later editions.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Denial of Service vulnerability in .NET (CVE-2026-26127). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.5, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker could cause an out-of-bounds read in .NET allowing an unauthorised attacker to deny service over a network. The vulnerability affects .NET 9 and 10 on Windows, Mac OS and Linux as well as NuGet 9 and 10 packages.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released eight updates this month resolving a total of 80 CVEs, 21 of which are rated Critical. Adobe Commerce is the highest priority this month with a Priority 2 rating. Other affected products include Adobe Illustrator, Substance 3D Painter, Acrobat and Acrobat Reader, Premier Pro, Experience Manager, Substance 3D Stager, and DNG SDK.&lt;/p&gt;

&lt;p&gt;Mozilla has released an update for Firefox 148.0.2 resolving three High severity vulnerabilities.&lt;/p&gt;

&lt;h2&gt;March update to-do list&lt;/h2&gt;

&lt;p&gt;The Microsoft OS and Office updates will resolve the majority of the CVEs resolved this month in two easy updates.&lt;/p&gt;

&lt;p&gt;Mozilla Firefox, Microsoft Edge and Google Chrome are all released frequently. Prioritise browser updates on a weekly or daily basis to reduce risks continuously with minimal risk of impact.&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 21:01:35 Z</pubDate></item><item><guid isPermaLink="false">cfe3f6d0-7686-4667-8caa-8fdb5e58c49c</guid><link>https://www.ivanti.com/en-gb/blog/february-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>February 2026 Patch Tuesday</title><description>&lt;p&gt;February Patch Tuesday includes recent out-of-band updates from Microsoft between January 17th and 29th, including multiple bug fixes and a fix for a zero-day exploit in Microsoft Office. In addition, Microsoft announced the phased disablement of NTLM precede the February 2026 Patch Tuesday release.&lt;/p&gt;

&lt;p&gt;For the February Patch Tuesday release, Microsoft has resolved 57 unique CVEs. Six CVEs are flagged as Exploited and three of those are Publicly Disclosed as well. Add the out-of-band (OOB) zero-day and you have a lineup of CVEs that need some attention.&lt;/p&gt;

&lt;h2&gt;January Out-of-Band Releases&lt;/h2&gt;

&lt;p&gt;The first OOB release on January 17th resolved a credential prompt failure when attempting remote desktop or remote appliance connections. The second round of OOB updates occurred on January 24th and 26th resolving application crashes in Outlook and OneDrive, and system hibernation/shut down issues. And finally, the third OOB update on January 26th was a zero-day vulnerability &amp;nbsp;CVE-&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;2026-21509&lt;/a&gt;, a Microsoft Office Security Feature bypass vulnerability.&lt;/p&gt;

&lt;h2&gt;Microsoft plans phased NTLM disablement&lt;/h2&gt;

&lt;p&gt;Microsoft released their plan for the&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt;&amp;nbsp;of New Technology LAN Manager (NTLM) in the latest operating systems starting now in 2026 and beyond. The NTLM authentication protocol was introduced back in 1993 and has since been superseded by Kerberos protocols, which are far more secure. However, NTLM has remained the fallback when Kerberos is unavailable despite being deprecated and having weak algorithms.&lt;/p&gt;

&lt;p&gt;Phase one introduces additional auditing to help identify where NTLM may still be running and&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782" rel="noopener" target="_blank"&gt;changing it out&lt;/a&gt;&amp;nbsp;where you can. Starting now, Microsoft recommends using&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" rel="noopener" target="_blank"&gt;advanced NTLM auditing&lt;/a&gt;&amp;nbsp;already available in Server 2025, and Windows 11 24H2 and newer. Phase two begins with major OS updates coming later this year. This update will address the ‘pain points’ or blockers by removing multiple fallback scenarios where Kerberos reverts back to NTLM.&lt;/p&gt;

&lt;p&gt;And finally in phase three, NTLM will be disabled by default. The code will still be there, but you will need to explicitly re-enable it if absolutely needed. This three-phase approach will happen quickly, so plan appropriately to replace NTLM in your environment and take a giant security step forward. The ‘NTLM disabled by default’ phase will occur with the next major Server update.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;On January 29th, Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;CVE-2026-21509&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can send a user a malicious Office file and convince them to open the file to exploit the vulnerability. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Remote Desktop Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533" rel="noopener" target="_blank"&gt;CVE-2026-21533&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519" rel="noopener" target="_blank"&gt;CVE-2026-21519&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in MSHTML Framework (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513" rel="noopener" target="_blank"&gt;CVE-2026-21513&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Windows Shell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510" rel="noopener" target="_blank"&gt;CVE-2026-21510&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514" rel="noopener" target="_blank"&gt;CVE-2026-21514&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can bypass a security feature locally due to a reliance on untrusted inputs. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Denial of Service vulnerability in Windows Remote Access Connection Manager (CVE-2026-21525). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.2, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. A null pointer dereference in Windows Remote Access Connection Manager allows an unauthorised attacker to deny service locally. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for February. The update affects Ivanti Endpoint Manager and resolves two new CVEs and 11 medium severity CVEs that were disclosed in late 2025. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/blog/february-2026-security-update"&gt;February Security Advisory&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, there was a security advisory on January 29th for Ivanti Endpoint Manager Mobile (EPMM) that had a limited number of customers impacted at time of disclosure. Ivanti urges all customers using the on-prem EPMM product to promptly instal the Security Update. The security advisory, additional technical analysis, and an Exploitation Detection script co-developed with NCSC-NL can be found in the &lt;a href="https://www.ivanti.com/en-gb/blog/january-2026-epmm-security-update"&gt;January Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates this month resolving 43 CVEs, 27 of which are Critical. All nine updates are rated Priority three by Adobe.&lt;/p&gt;

&lt;h2&gt;February update to-do list&lt;/h2&gt;

&lt;p&gt;Windows OS and Microsoft Office updates are priority this month resolving six new and one OOB zero-day exploits.&lt;/p&gt;

&lt;p&gt;Review Microsoft&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt; of NTLM announcement and documentation to start planning for the deprecation and disablement of NTLM.&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 21:58:44 Z</pubDate></item><item><guid isPermaLink="false">f1ce673e-e8a1-4464-80d6-d20ffc845cb6</guid><link>https://www.ivanti.com/en-gb/blog/january-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>January 2026 Patch Tuesday</title><description>&lt;p&gt;New year,&amp;nbsp;new updates!&amp;nbsp;Welcome back to the Ivanti Patch Tuesday blog where we&amp;nbsp;provide&amp;nbsp;you&amp;nbsp;critical insights to&amp;nbsp;optimise&amp;nbsp;your exposure management activities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This month there are a pair of Mozilla CVEs that are suspected&amp;nbsp;of being&amp;nbsp;exploited and a Microsoft CVE that has been exploited.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, Microsoft has a pair of&amp;nbsp;publicly disclosed vulnerabilities that will need to be reviewed to see if your organisation may be&amp;nbsp;impacted&amp;nbsp;by the changes Microsoft is making.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are&amp;nbsp;additional&amp;nbsp;third-party&amp;nbsp;updates&amp;nbsp;from Adobe,&amp;nbsp;and&amp;nbsp;you should&amp;nbsp;expect more from Google and Oracle over the next few days and into next week&amp;nbsp;that should be included in your monthly maintenance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A side note of good news:&amp;nbsp;Microsoft has broken the Server 2025&amp;nbsp;update out&amp;nbsp;into a separate KB,&amp;nbsp;so it is only&amp;nbsp;1.9GB in size,&amp;nbsp;versus this month’s&amp;nbsp;4GB+ Windows 11 cumulative update.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an&amp;nbsp;Information Disclosure vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805" rel="noopener" target="_blank"&gt;CVE-2026-20805&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 5.5, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. The exposure could be used to&amp;nbsp;disclose&amp;nbsp;a section address from a remote ALPC port&amp;nbsp;that&amp;nbsp;is user-mode memory. The vulnerability affects all currently supported and extended security update-supported versions of the Windows OS. A risk-based prioritisation&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a&amp;nbsp;Security Feature Bypass vulnerability in Secure Boot Certification Expiration&amp;nbsp;(&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265" rel="noopener" target="_blank"&gt;CVE-2026-21265&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of&amp;nbsp;6.4,&amp;nbsp;but&amp;nbsp;it&amp;nbsp;has been publicly&amp;nbsp;disclosed.&amp;nbsp;In&amp;nbsp;addition&amp;nbsp;the update, the&amp;nbsp;fix&amp;nbsp;provides a warning&amp;nbsp;regarding&amp;nbsp;certificates that will be expiring in 2026&amp;nbsp;and details on actions that are&amp;nbsp;required&amp;nbsp;to up&amp;nbsp;renew&amp;nbsp;certificates&amp;nbsp;prior to their&amp;nbsp;expiration.&amp;nbsp;It is recommended to start investigating what actions your organisation may need to take to prevent potential serviceability and security as certificates expire.&amp;nbsp;  &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft is addressing&amp;nbsp;an&amp;nbsp;Elevation of Privilege vulnerability in Windows Agere Soft Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096" rel="noopener" target="_blank"&gt;CVE-2023-31096&lt;/a&gt;). The vulnerability CVE ID was assigned by MITRE&amp;nbsp;in 2023. It&amp;nbsp;is rated Important and has a CVSS v3.1 score of 7.8.&amp;nbsp;The CVE has been publicly&amp;nbsp;disclosed. Microsoft’s resolution is to remove the affected drivers from the Windows OS as&amp;nbsp;of the January 2026 cumulative update. Microsoft recommends removing any existing dependencies on this hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released no security advisories this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/" rel="noopener" target="_blank"&gt;Mozilla has released updates for Firefox and Firefox ESR,&amp;nbsp;resolving a total of&amp;nbsp;34&amp;nbsp;CVEs&lt;/a&gt;. All three updates have an Impact rating of High. Two CVEs are suspected to be exploited (CVE-2026-0891 and CVE-2026-0892). Both are resolved in Firefox 147 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" rel="noopener" target="_blank"&gt;MFSA2026-01&lt;/a&gt;),&amp;nbsp;and CVE-2026-0891 is resolved in Firefox ESR 140.7 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/" rel="noopener" target="_blank"&gt;MFSA2026-03&lt;/a&gt;).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Expect Google Chrome and Microsoft Edge updates this week in addition to a high-severity vulnerability in Chrome WebView that was resolved in the January 6 Chrome update (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe&amp;nbsp;has released 11 updates this month affecting&amp;nbsp;DreamWeaver, InDesign,&amp;nbsp;Illustrator, InCopy, Bridge, Substance 3D Modeller, Stager, Painter,&amp;nbsp;Sampler&amp;nbsp;and Designer and&amp;nbsp;Coldfusion.&amp;nbsp;Coldfusion&amp;nbsp;is a priority 1. Everything else is priority 3, but most of the updates include Critical CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Oracle’s Quarterly CPU is scheduled to&amp;nbsp;release&amp;nbsp;on January 20, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out,&amp;nbsp;expect&amp;nbsp;all of&amp;nbsp;the Java-based frameworks to update over the next few weeks.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;January update&amp;nbsp;to-do&amp;nbsp;list&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Browser updates are a priority this month. Mozilla resolved two suspected zero-day exploits (CVE-2026-0891 and CVE-2026-0892),&amp;nbsp;and Chrome resolved a high-severity CVE (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The Windows OS update resolves one exploited and two publicly disclosed vulnerabilities this month,&amp;nbsp;putting the Windows OS update as top priority this month&amp;nbsp;alongside&amp;nbsp;the browser updates.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Review Secure Boot Certificate timelines and usage of Agere Soft Modem drivers&amp;nbsp;to avoid serviceability and security issues.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 Jan 2026 21:52:53 Z</pubDate></item><item><guid isPermaLink="false">a937ebe7-be62-430c-a983-d1bae559151d</guid><link>https://www.ivanti.com/en-gb/blog/december-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>December 2025 Patch Tuesday</title><description>&lt;p&gt;Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and two publicly disclosed CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). This month’s OS update resolves the exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and one of the public disclosures (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;), making the Windows OS a top priority this month. The other public disclosure is in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;), which would require developers to download and update the GitHub Copilot plugin.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Third-party updates this Patch Tuesday include multiple releases from Mozilla for Firefox 146 and Firefox ESR 115.31 and 140.6. Adobe released five updates to resolve 142 CVEs including an update for Adobe Acrobat and Reader. Four of five updates are rated as Priority Three, but the Adobe ColdFusion update is rated Priority One. There are no known exploits, but the ColdFusion update resolves the bulk of the CVEs resolved by Adobe this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but is confirmed to be exploited in the wild. An attacker who successfully exploits this CVE could gain SYSTEM privileges. The CVE affects Windows 10 and later Windows editions. A risk-based prioritisation approach would prioritise this CVE as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in PowerShell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but has been publicly disclosed. The fix provides a warning and guidance to avoid the potential remote code execution, but the nature of the exposure makes it improbable to fully remediate. The Invoke-WebRequest command can parse the contents of a web page and could potentially run script code in the web page when it is parsed. A warning is presented recommending the use of the -UseBasicParsing switch to avoid script code execution. The CVE affects Server 2008 and later Windows editions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.4 but has been publicly disclosed. An attacker could exploit code using a malicious Cross Prompt Inject in untrusted files or MCP servers, allowing the execution of additional commands by appending them to commands allowed in the user’s terminal auto-approve setting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update this month. The update affects Ivanti Endpoint Manager and resolves four vulnerabilities. More details and information about mitigations can be found in the &lt;a href="https://www.ivanti.com/en-gb/blog/december-2025-security-update"&gt;December Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR resolving a total of 27 CVEs. All three updates have an Impact rating of High.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released five updates this month affecting ColdFusion, Experience Manager, DNG SDK, Acrobat and Reader and Creative Cloud Desktop. ColdFusion is a Priority One and resolves the majority of the 142 CVEs. The other four updates are rated Priority Three.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;December update priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The Windows OS update is the priority this month to resolve &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;All other updates can be resolved under normal SLA priorities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 09 Dec 2025 22:05:21 Z</pubDate></item><item><guid isPermaLink="false">dae27e64-a0e9-4ec8-85d5-2a80b19fc302</guid><link>https://www.ivanti.com/en-gb/blog/unpatchable-vulnerabilities-risk-mitigation-strategies</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><title>Unpatchable Vulnerabilities: Key Risk Mitigation Strategies</title><description>&lt;p&gt;Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s not the world we live in.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where the conversation broadens, from vulnerability management to full spectrum &lt;a href="https://www.ivanti.com/glossary/exposure-management" target="_blank" rel="noopener"&gt;exposure management&lt;/a&gt;. Because unpatchable vulnerabilities aren’t edge cases. They're part of your everyday risk landscape and deserve a seat at every CISO’s table.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The problem? Too many organisations still equate vulnerability management with patching, and that mindset creates blind spots big enough for attackers to walk right through. It ignores the exposures lurking outside traditional infrastructure: Cloud misconfigs, expired certs, &lt;a href="https://www.ivanti.com/en-gb/blog/software-supply-chain-attack-risk"&gt;third-party software dependencies&lt;/a&gt;, identity abuse and more.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What are unpatchable vulnerabilities?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Unpatchable vulnerabilities live up to their name. They’re flaws you can’t fix with a vendor patch, and not as rare as you might think. In today’s environment, risk is as likely to come from a cloud misconfiguration or expired certificate as it is from a missing update. But if your strategy focuses only on infrastructure vulnerabilities, you’re leaving massive gaps in your defences.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most teams lack total &lt;a href="https://www.ivanti.com/en-gb/blog/attack-surface-visibility-gaps"&gt;attack surface visibility&lt;/a&gt; and treat infrastructure as the entire &lt;a href="https://www.ivanti.com/glossary/attack-surface" target="_blank" rel="noopener"&gt;attack surface&lt;/a&gt;. Full stop. But that’s only one layer in a much broader landscape. The reality is that there are five critical layers where vulnerabilities live, and only one of them can be reliably managed with traditional patching.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/unpatchable-blog_attack-surface-graphic.png"&gt;&lt;/p&gt;

&lt;p&gt;The rest? They're unpatchable by nature. And each requires a different approach if you want to close the gaps. Let’s go through each one at a time:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Infrastructure&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Infrastructure is the attack surface layer that everyone knows. It’s where traditional vulnerability management and patch management lives. And yes, it’s critical. But treating this as the whole (or only) attack surface is like locking your front door and ignoring the open windows.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2. External attack surface&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The &lt;a href="https://www.ivanti.com/en-gb/products/external-attack-surface-management"&gt;external attack surface&lt;/a&gt; is what an adversary sees when they look at your organisation from the outside. Your domains, subdomains and exposed services are entry points you don’t always control directly and often aren’t picked up in infrastructure scans.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. Cloud services&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Cloud misconfigurations are one of today’s most dangerous blind spots and also among the most overlooked, particularly in environments that have rapidly adopted cloud services without simultaneously evolving their security practices. We’ve seen the headlines about data exposed through misconfigured storage buckets or overly permissive APIs. These aren’t software flaws. They’re setup mistakes, and no patch can fix a poorly set permission.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;4. Identity&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Then there’s identity. Every user account, credential and session token is a target. If a threat actor phishes your credentials or cracks a weak password, they’re not even exploiting a system vulnerability. They’re using your systems exactly as designed. Don’t mistake identity for a layer of access control. It serves as its own attack surface.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;5. Data&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;And finally: data. The way you classify, store and secure data all represent a surface area always being probed by attackers. If sensitive information is in the wrong place, with the wrong permissions, that’s an open invitation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patching is critical. It gives you remediation coverage on endpoints and servers. But it only addresses one piece of the puzzle. The rest of your environment requires a wider lens.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The reality is: exposures aren’t buried in code. They live in misconfigurations, overly broad permissions, architectural shortcuts and legacy systems either forgotten or left to rot in the background. Those don’t get fixed with a patch. They get fixed with strategy.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Examples of unpatchable vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.cybersecuritydive.com/news/log4j-haunts-security-community/702011/" rel="noopener" target="_blank"&gt;Log4j&lt;/a&gt; was a wake-up call. A single vulnerable library embedded across dozens of applications, many of them business-critical. You couldn’t just “push a patch”. You had to wait for each vendor to update their software, and/or manually disable vulnerable components until you closed that hole.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s just one example of how complexity can derail vulnerability management. Other cases are even more problematic:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-for-iiot"&gt;IoT devices&lt;/a&gt; often operate as closed systems, with firmware controlled entirely by the vendor. If vendor support ends, you’re left with internet-connected assets that IT can’t update directly as firmware is locked behind vendor-controlled gates. Without updates, vulnerabilities remain exposed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Network Edge Devices (Firewalls, VPNs, etc.) come with layers of complex rules, configurations and dependencies, configurations and dependencies that can’t be blindly updated. Every change must be tested against business-critical services to avoid outages. One single misstep can knock systems offline or break key integrations. That’s why most teams treat these updates like surgical procedures: slow, meticulous and weighed carefully against the organisation’s &lt;a href="https://www.ivanti.com/en-gb/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And then there’s cryptographic decay. It’s the slow decay of trust in encryption as attackers get faster and standards grow older. TLS and SSL protocols, once considered rock solid, become exploitable over time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And none of them can be addressed by traditional patching models. They live outside the boundaries of what scanners catch and patching can solve. That’s why a broader security strategy, one rooted in exposure reduction and not just patching, needs to guide your approach.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Multifaceted risk mitigation strategies&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Start by targeting the weakest links in your environment: outdated protocols, misconfigurations and overexposed assets. Then, assess who and what has access to your systems. Shrink those access pathways to only what’s essential. This reduces the damage radius when something goes wrong.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Next, break risk mitigation into multiple workstreams. Not every vulnerability can be addressed the same way or on the same timeline. You need parallel tracks for short-term containment and long-term resilience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the short term, if you're facing an unpatchable vulnerability, ask: how do we minimise impact now? The Log4j response is a good model. There, we deployed scripts that disabled vulnerable components in real time, limiting exposure while waiting for a vendor patch.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the same time, build a longer-term framework. Automate configuration updates wherever possible. Create a roadmap for phasing out end-of-life apps and platforms. Map ownership across critical systems, including which teams or vendors control updates and what permissions or dependencies might block timely fixes. When an issue arises, that prep work determines whether you're reacting in chaos or executing a plan.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tactics will vary — scripts, segmentation, zero trust, re-architecture — but the goal stays the same: reduce the time and space adversaries have to exploit your systems. Shrink the window. Stay ahead of it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The organisations that succeed in managing unpatchable vulnerabilities are the ones who understand their environment inside and out. They never stop refining that understanding. That means having a real-time asset inventory, visibility into what’s running where and a comprehensive Software Bill of Materials (SBOM) that tells you what’s inside your software.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They also monitor the entire attack surface. Not just endpoints, but external perimeters, cloud configurations, identity systems, and the data itself. Anything less than that leaves blind spots wide open.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They build tight operational bridges between teams. When a high-risk exposure surfaces, network ops, application owners and developers already know who’s on point, what actions to take and how to move fast without triggering service disruptions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Above all, they know that “unpatchable” doesn’t mean unmanageable. It just means you need a different playbook: one that’s layered, cross-functional and laser-focused on reducing real-world risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more on how to elevate your approach to vulnerability management and risk mitigation, check out Ivanti’s research report: &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch" target="_blank" rel="noopener"&gt;Risk-Based Patch Prioritization&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 20 Oct 2025 13:00:00 Z</pubDate></item><item><guid isPermaLink="false">1afb70b0-8634-4268-871b-81a9978ae490</guid><link>https://www.ivanti.com/en-gb/blog/october-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>October 2025 Patch Tuesday</title><description>&lt;p&gt;October Patch Tuesday is going to be a busy one from all angles. Microsoft exceeded the January CVE count (159 CVEs) by a healthy margin, with 172 CVEs resolved this month. There are three exploited and two publicly disclosed vulnerabilities this month, but fortunately all of them are in the cumulative OS update, making resolution quick and clean. They are also end of life-ing a lot of products, including Windows 10! Additionally, Office 2016 and 2019 and Exchange Server 2016 and 2019 have also reached end of life.&lt;/p&gt;

&lt;p&gt;Adobe released 12 updates resolving 36 CVEs. Mozilla released five updates resolving 45 CVEs and are cautioning users that three of these CVEs are showing signs they may have been exploited in the wild (unconfirmed). And of course, Google Chrome is expected to release their weekly update in the next 24 hours.&lt;/p&gt;

&lt;p&gt;There is a lot to unpack, so let’s get started.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Secure Boot bypass in IGEL OS before 11 vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827" rel="noopener" target="_blank"&gt;CVE-2025-47827&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 4.6. Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature, allowing a crafted root file system to be mounted from an unverified image.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Remote Access Connection Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230" rel="noopener" target="_blank"&gt;CVE-2025-59230&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8. Improper access control in Windows Remote Access Connection Manager allows an authorised attacker to elevate privileges locally. A risk-based prioritisation methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990" rel="noopener" target="_blank"&gt;CVE-2025-24990&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8.&amp;nbsp; The driver shipped natively with the Windows OS. Microsoft has removed the driver with the October cumulative update and recommends removing any existing dependencies on this fax modem hardware. Exploit is possible even if the drive is not being used. A risk-based prioritisation methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052" rel="noopener" target="_blank"&gt;CVE-2024-24052&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 7.8. The exploit code maturity is listed as proof-of-concept, which increases the risk of exploitation. A risk-based prioritisation methodology would warrant treating this as Critical.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an out-of-bounds read vulnerability in TCG TPM2.0 reference implementation (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884" rel="noopener" target="_blank"&gt;CVE-2024-2884&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 5.3. The exploit code maturity is listed as unproven, indicating there is currently no publicly available code.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates and one Security Advisory for October Patch Tuesday, resolving a total of seven CVEs. The affected products include Ivanti Neurons for MDM and Ivanti Endpoint Manager Mobile. The Ivanti Neurons for MDM vulnerabilities were resolved for all customers on October 10, 2025. An additional Security Advisory was released for Ivanti Endpoint Manager, which provides mitigation options for vulnerabilities disclosed October 7, 2025.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/october-2025-security-update"&gt;October Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released 12 updates addressing 36 CVEs. Adobe has rated the Commerce update as a priority two and the rest of the updates as priority three.&lt;/li&gt;
	&lt;li&gt;Mozilla released five updates resolving 45 CVEs. Three of the CVEs included variations of the statement, “Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code,” indicating a possibility of exploitation in the wild. All five updates include at least one of the suspected exploit CVEs, we recommend treating all five as containing a known exploited CVE.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release in the next 24 hours, so plan a Chrome update and a possible Edge update shortly after.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;October update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS cumulative update is the top priority this month, as it resolves three exploited and two publicly disclosed CVEs.&lt;/li&gt;
	&lt;li&gt;All Mozilla updates should be deployed during your current maintenance, but any deferral or delay would come with risks as there are three CVEs that are speculated to be exploitable in the wild already.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Oct 2025 21:43:03 Z</pubDate></item><item><guid isPermaLink="false">03dd2814-9086-4516-8a41-2bc1c212554b</guid><link>https://www.ivanti.com/en-gb/blog/continuous-vulnerability-management</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><title>Schrödinger’s Vulnerability: Why Continuous Vulnerability Management Isn’t Optional</title><description>&lt;p&gt;The classic thought experiment known as &lt;a href="https://www.newscientist.com/definition/schrodingers-cat/" rel="noopener" target="_blank"&gt;Schrödinger’s Cat&lt;/a&gt; imagines a cat that’s simultaneously alive and dead; that is, until someone opens the box. In other words, it’s both alive and dead until the point that we can confirm the truth.&lt;/p&gt;

&lt;p&gt;Now, swap the cat for software vulnerabilities, and you’ve got a fantastic analogy for what happens in today’s security environment. Teams won’t know a vulnerability exists until it’s discovered and in the worst cases, until it’s already being exploited.&lt;/p&gt;

&lt;p&gt;That uncertainty is what I call &lt;em&gt;&lt;strong&gt;Schrödinger’s vulnerability&lt;/strong&gt;&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;It’s the gap between the assumption of safety and the reality of exposure. And it’s a gap that traditional vulnerability management practices alone can’t bridge.&lt;/p&gt;

&lt;p&gt;With threat actors leveraging automation and AI to enhance the speed and scale of their attacks, the time between the discovery of a vulnerability and exploitation is shrinking. Organisations can’t afford to waste time identifying and &lt;a href="https://www.ivanti.com/en-gb/resources/time-to-patch"&gt;patching vulnerabilities&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Traditional patching methods are on a fixed cadence – once a month or once a week – but this approach is out of touch with the realities of modern threats.&lt;/p&gt;

&lt;p&gt;Organisations need to branch out from relying just on reactive, scheduled &lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-for-patch-management"&gt;patch management&lt;/a&gt; and remediation cycles. It’s time we shift our mindset to an always-on, comprehensive way of understanding a potential vulnerability – even before we know that the vulnerability exists.&lt;/p&gt;

&lt;h2&gt;The Patch Tuesday problem: real-world threats move faster&lt;/h2&gt;

&lt;p&gt;Let’s start with what we all know: &lt;a href="https://www.ivanti.com/en-gb/resources/patch-tuesday"&gt;Patch Tuesday&lt;/a&gt; is predictable. Patch Tuesday remains an important practice in helping security teams prioritise their updates and remediate newly-identified vulnerabilities. Leading tech companies like Microsoft, Apple and Ivanti itself release their updates and patches on a regular cycle, giving IT and security teams time to prepare their own maintenance cycles.&lt;/p&gt;

&lt;p&gt;However, the problem is that many vulnerabilities aren't so predictable.&lt;/p&gt;

&lt;p&gt;For example, popular third-party applications such as Adobe, Mozilla and Google are continuously releasing updates to common applications — such as browsers — that we all use on a daily basis.&lt;/p&gt;

&lt;p&gt;For organisations only anchored to a monthly maintenance schedule, this can create a dangerous delay. Each time you “close the box” and wait for the next patch window, you leave a 29-day exposure gap wide open.&lt;/p&gt;

&lt;p&gt;Consider what happened in the spring months of 2025: in the span of five weeks, Chrome, Edge and Firefox each identified zero-day vulnerabilities that required immediate attention:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Two Firefox vulnerabilities &lt;a href="https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html" rel="noopener" target="_blank"&gt;publicly exploited at the Pwn2Own hacker competition&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.helpnetsecurity.com/2025/07/16/update-google-chrome-to-fix-actively-exploited-zero-day-cve-2025-6558/" rel="noopener" target="_blank"&gt;An actively exploited zero-day in Chrome&lt;/a&gt; and its sibling browser, Edge&lt;/li&gt;
	&lt;li&gt;Multiple rapid-fire CVE disclosures demanding swift action&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Modern cyber attackers can reverse-engineer newly released patches to uncover the underlying vulnerability, weaponize proof-of-concept exploits and launch automated attacks.&lt;/p&gt;

&lt;p&gt;Once a vulnerability is publicly disclosed, you enter a critical window to resolve the issue before threat actors can take advantage of it. In fact, the June 2025 zero-day in Chrome (CVE-2025–5419) was actively exploited in the wild upon patch release, underscoring how quickly adversaries can weaponize a disclosed flaw.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday timeline of events from May-June 2025" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-graphic-1-patch-timeline.jpg"&gt;&lt;/p&gt;

&lt;p&gt;To extend our Schrödinger’s analogy: vulnerability management is like herding cats. And as anyone who’s tried to herd cats knows, it’s a 24/7, round-the-clock job. In other words, &lt;a href="https://www.ivanti.com/blog/continuous-vulnerability-management-is-a-must" target="_blank" rel="noopener"&gt;continuous vulnerability management&lt;/a&gt; is even more crucial now than before.&lt;/p&gt;

&lt;h2&gt;The IT burden: continuous releases and compressed SLAs&lt;/h2&gt;

&lt;p&gt;Threat velocity is only half the challenge. As more vendors shift to continuous release cycles, it forces security teams to shrink SLAs, sometimes dramatically. The result is often “smoke-test validation”, confirming a patch has been installed without fully checking its impact. That’s how bugs, compatibility issues and missed dependencies slip through. You’re increasing operational risk even when trying to reduce security risk. It’s like peeking in the box to see if the cat’s breathing and missing the open window behind it.&lt;/p&gt;

&lt;p&gt;IT teams are struggling to test, validate and deploy patches at that increased pace, &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch" target="_blank" rel="noopener"&gt;according to Ivanti research&lt;/a&gt;. Nearly four out of 10 (39%) cybersecurity professionals find it a challenge to prioritise risk remediation and patch deployment, and 35% aren’t consistently able to maintain compliance when patching.&lt;/p&gt;

&lt;p&gt;A different approach is needed. Teams need to be more proactive and continuous in their approach. This means establishing a mindset of &lt;a href="https://www.ivanti.com/glossary/exposure-management" target="_blank" rel="noopener"&gt;exposure management&lt;/a&gt; to be more proactive.&lt;/p&gt;

&lt;h2&gt;Risk appetite: the starting point for exposure management&lt;/h2&gt;

&lt;p&gt;Every organisation has a different tolerance threshold regarding risk. That’s your &lt;a href="https://www.ivanti.com/en-gb/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. If you haven’t formally defined that in your teams, you can’t operationalize an effective response strategy.&lt;/p&gt;

&lt;p&gt;That’s why continuous vulnerability management starts with a conversation across stakeholders. You must bring security ops, IT and business leadership to the table to address critical questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What level of exposure are we willing to tolerate?&lt;/li&gt;
	&lt;li&gt;How fast can we realistically respond to zero-day threats?&lt;/li&gt;
	&lt;li&gt;What's the financial, operational and reputational cost of being wrong?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;average cost of a ransomware incident is now reported as being upwards of $5 million&lt;/a&gt;. That’s no small sum, and especially for smaller organisations, the high costs may pose an existential threat to their business.&lt;/p&gt;

&lt;p&gt;For enterprises, it’s more the brand damage and regulatory exposure where it stings the most.&lt;/p&gt;

&lt;p&gt;No matter your size, these numbers demand a shift from measuring patching SLAs to actively managing exposure.&lt;/p&gt;

&lt;h2&gt;From cadence to coverage: tiered patch management framework&lt;/h2&gt;

&lt;p&gt;At Ivanti, we’ve operationalized this mindset through a flexible, layered policy framework within our &lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-for-patch-management"&gt;Neurons for Patch Management platform&lt;/a&gt;. This starts with three policy tiers that align with real-world vulnerability response patterns:&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch tiers graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-blog-graphic-2-patch-tiers.png"&gt;&lt;/p&gt;

&lt;h3&gt;1. Routine maintenance&lt;/h3&gt;

&lt;p&gt;This is your baseline: OS updates, scheduled, third-party patches, standard hygiene. While essential, it’s insufficient if it stands on its own. You’re keeping the lights on, but you’re not ready when a storm hits.&lt;/p&gt;

&lt;h3&gt;2. Priority updates&lt;/h3&gt;

&lt;p&gt;Browsers, collaboration tools and document apps change constantly, making them prime targets for exploitation. Because of the perpetual change and evolution of these apps, they require faster response cycles and purpose-built policies. We’ve created default configurations to help customers proactively manage these risk-prone applications with minimal friction.&lt;/p&gt;

&lt;h3&gt;3. Zero-Day response&lt;/h3&gt;

&lt;p&gt;Agility matters most here. When a zero-day is discovered and disclosed (or worse, exploited), you don’t have time to debate or argue about what to do in response. You need preconfigured, battle-tested policies that you can pivot to immediately and patch outside your normal cycle.&lt;/p&gt;

&lt;p&gt;These three tiers running parallel to each other give organisations a starting point for moving beyond cadence-based patching. They operationalize the concept of risk appetite by matching prescribed response urgency to the nature of the threat.&lt;/p&gt;

&lt;h2&gt;Multilayered vulnerability management and continuous compliance&lt;/h2&gt;

&lt;p&gt;&lt;img alt="continuous compliance graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-graphic-3-continuous-compliance.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Not every system is perfect, though. What happens when something falls through the cracks?&lt;/p&gt;

&lt;p&gt;Maybe an employee was on vacation. Maybe a system was turned off. Maybe a new device was integrated without the latest patches. These are the edge cases that create silent, persistent risk. These are your very own Schrödinger’s vulnerabilities.&lt;/p&gt;

&lt;p&gt;To solve this requires a fourth remediation track: &lt;strong&gt;Continuous Compliance&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This task runs in the background. It monitors for devices that don’t meet your latest patching baseline from routine to zero-day. When it finds gaps, it closes them &lt;em&gt;automatically&lt;/em&gt;. It’s like a bank’s vault automatically locking shut when thieves trigger the alarm.&lt;/p&gt;

&lt;p&gt;There’s no need to wait for the next Patch Tuesday or have someone manually watch the dashboard 24/7. This is where true continuous vulnerability management takes shape. Ongoing coverage (and security) rather than manual reaction.&lt;/p&gt;

&lt;h2&gt;Shrinking the noise: focus on what matters&lt;/h2&gt;

&lt;p&gt;There’s another critical benefit here: dramatically reducing the volume of noise your security teams have to triage.&lt;/p&gt;

&lt;p&gt;Take July’s &lt;a href="https://www.ivanti.com/en-gb/resources/patch-tuesday"&gt;Patch Tuesday&lt;/a&gt;. Microsoft released patches for 104 CVEs. Let’s do the math: say you have 3,000 Windows 11 machines in your user base. That means more than 300,000 “findings” for your vulnerability scanner.&lt;/p&gt;

&lt;p&gt;But here’s the thing: if your exposure management programme is doing its job, 99% of those findings are already addressed and accounted for in your routine maintenance, priority updates or in your zero-day response tasks. No more needing to parse through mountains of redundant alerts – your team can now home in on what needs real attention, including gaps, anomalies and uncompliant systems.&lt;/p&gt;

&lt;p&gt;That’s how you move from reactive alert fatigue to active risk reduction.&lt;/p&gt;

&lt;h2&gt;From patch management to preparedness&lt;/h2&gt;

&lt;p&gt;This, ultimately, is a mindset shift. You’re moving from a reactive model to a proactive one. You’re shifting from waiting for vulnerabilities to surface and deciding what to do about them, to responding with predefined and automated processes firmly in place.&lt;/p&gt;

&lt;p&gt;That’s the difference between simply patching and being prepared. It matters more now than ever, with CVE counts rising and threat actors faster, smarter and better resourced.&lt;/p&gt;

&lt;p&gt;Regulatory expectations are also growing. Whether it’s SEC disclosure rules, National Institute of Standards and Technology (NIST) frameworks or industry-specific compliance mandates, the bar for “reasonable security” is climbing.&lt;/p&gt;

&lt;p&gt;The baseline has changed: it’s no longer patch and react. It’s continuous vulnerability management.&lt;/p&gt;

&lt;h2&gt;Not falling for Schrödinger’s vulnerability&lt;/h2&gt;

&lt;p&gt;Back to the cat. The whole point of Schrödinger’s Cat thought experiment is that uncertainty persists &lt;em&gt;until you look&lt;/em&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s fun in concept, but it’s dangerous when you apply that mentality to cybersecurity. You can’t just hope you won’t get hit — you must &lt;a href="https://www.ivanti.com/en-gb/products/risk-based-vulnerability-management"&gt;manage risk&lt;/a&gt; through continuous monitoring, patching and enforcing.&lt;/p&gt;

&lt;p&gt;With the right measures in place, you’re not opening the box wondering if a vulnerability is “alive” or not. You’ve already taken steps to keep it safe. You can open with confidence and then shut the window of exposure before it even becomes an open door.&lt;/p&gt;

&lt;p&gt;Discover more best practices to elevate your current patching and remediation efforts to a proactive, high-performing security strategy in our full &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch" target="_blank" rel="noopener"&gt;Risk-Based Patch Prioritization Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 17 Sep 2025 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">27cd2aec-f887-4831-bfa0-0e15c3b491a1</guid><link>https://www.ivanti.com/en-gb/blog/september-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>September 2025 Patch Tuesday</title><description>&lt;p&gt;The days leading into September Patch Tuesday include a bit of chaos from a pair of actively exploited Android CVEs (CVE-2025-38352, CVE-2025-48543), a zero day in WhatsApp (CVE-2025-55177), another zero day in WinRAR (CVE-2025-8088), and a major supply chain attack through the Drift AI Chat Agent exposing Salesforce customers data.&lt;/p&gt;

&lt;p&gt;The good news is Microsoft only has a pair of publicly disclosed vulnerabilities (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;) out of 81 total CVEs resolved this month, making this about as close to a calm Patch Tuesday as we can hope for.&lt;/p&gt;

&lt;p&gt;The Windows OS and Office updates are rated Critical this month, putting those as the highest priority, but with no zero-day exploits, this month should be focused on routine maintenance from a Microsoft perspective.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 8.8 and affects all Windows OS editions. The code maturity is unproven, which would indicate no code samples have been disclosed. A risk-based prioritisation methodology would warrant treating this as Important.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Improper Handling of Exceptional Conditions vulnerability in Newtonsoft.Json (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is unrated and affects SQL Server 2016, 2017 and 2019. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial-of-service condition. A risk-based prioritisation methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates resolving 22 CVEs, 12 of which are rated Critical. The products affected include Adobe Acrobat Reader, After Effects, Premiere Pro, Commerce, Substance 3D Viewer, Experience Manager, Dreamweaver, 3D Substance Modeller and ColdFusion. Adobe has rated the ColdFusion update as a priority one and Commerce as a priority two. The other seven updates are rated priority three.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates for September Patch Tuesday resolving a total of 13 CVEs. The affected products include Ivanti Connect Secure and Policy Secure and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/september-2025-security-update"&gt;September Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;September update priorities&lt;/h2&gt;

&lt;p&gt;With no zero-days released on Patch Tuesday, the updates this month are predominantly low risk. Ensure you have the zero days leading up to Patch Tuesday in hand, and plan to deploy the Microsoft and Adobe updates through your regular maintenance activities this month.&lt;/p&gt;
</description><pubDate>Tue, 09 Sep 2025 21:28:36 Z</pubDate></item><item><guid isPermaLink="false">cbf938a4-efb9-4ca5-b61a-23f9db4b9ed5</guid><link>https://www.ivanti.com/en-gb/blog/august-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>August 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="cLNedMpRCyk"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;Let me start this month off with a question. Have you already decided what you are going to do for your remediation plan this month? Think about it for a second. OS updates, productivity apps, browsers, and other apps are already likely under consideration for your August patch maintenance. The real decisions you need to consider are around timing. Do you proceed with your typical Patch Tuesday plan or do you need to accelerate any zero-days, etc?&lt;/p&gt;

&lt;p&gt;What you just thought about was a generalisation of defining your risk appetite. There is a lot of discussion across the vulnerability management market about how to modernise vulnerability management. When you think about trends like 32% of 1H 2025 known exploited vulnerabilities (KEVs) being zero-day or 1-day exploits it can feel overwhelming. How do you keep up with a continuous stream of updates? Ideally by defining your outcome and configuring for success.&lt;/p&gt;

&lt;p&gt;If we break this month’s Patch Tuesday down into parallel remediation streams:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Routine Maintenance: Much of what just released today will fall into your reoccurring monthly maintenance which typically starts on Patch Tuesday and runs for two weeks or more depending on your SLAs, OS, productivity apps, third-party apps, etc.&lt;/li&gt;
	&lt;li&gt;Priority updates: Browsers tend to release more frequently (typically weekly) and may warrant a priority update track to keep up with the constant stream of new exposures in your environment. This patch cycle you may be resolving CVEs in multiple browsers from the past four weeks if you don’t have a more frequent update plan in place for the browsers.&lt;/li&gt;
	&lt;li&gt;Zero-day Response: The recent SharePoint exploits are a good example of the disruptive\unpredictable nature of zero-day exploits.&lt;/li&gt;
	&lt;li&gt;Continuous Compliance: The three previous tracks could solve most of your remediation challenges, but what about users who are on vacation, leave of absence, got a new system and shipping bypassed the current month’s maintenance window or installed something new that was not the latest version? Defining a baseline and keeping that updated as new updates pass your quality tests would keep your systems in compliance when the multitude of reasons for drift occur.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved one publicly disclosed vulnerability in Windows Kerberos (CVE-2025-53779). The CVE is an Elevation of Privilege vulnerability that could allow an attacker to gain domain admin privileges. The CVE is rated Medium and has a CVSS score of 7.2. The vulnerability only affects Windows Server 2025.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released thirteen new updates on Patch Tuesday, but the most urgent is the Adobe Experience Manager Forms update released on August 5 resolving two publicly disclosed CVEs (CVE-2025-54253 and CVE-2025-54254). &lt;a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html" rel="noopener" target="_blank"&gt;APSB25-82&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Google Chrome 139.0.7258 released resolving five CVEs and is rated Critical. This will also affect Microsoft Edge so watch for that update to come likely later this week.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;August update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft SharePoint is the top priority this month to resolve recent zero-day exploits being targeted by multiple nation state level threat actors. Update ASAP.&lt;/li&gt;
	&lt;li&gt;Adobe Experience Manager Forms update released on August 5 is your second highest priority.&lt;/li&gt;
	&lt;li&gt;Windows OS and Office have Critical CVEs this month. Get them updated as part of your regular maintenance and you should be good.&lt;/li&gt;
	&lt;li&gt;Microsoft Exchange Server and SQL Server each received updates. The CVEs were only rated as Important so no need to escalate remediation, but server admins should start to test and rollout within the next month.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 12 Aug 2025 22:08:03 Z</pubDate></item><item><guid isPermaLink="false">5bf2329e-ba5d-4257-9773-d230876f00e4</guid><link>https://www.ivanti.com/en-gb/blog/july-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>July 2025 Patch Tuesday</title><description>&lt;p&gt;July Patch Tuesday is a sizable one, but no significant security risk. Microsoft resolved 130 new CVEs, including one public disclosure. There are seven additional CVEs from MITRE regarding vulnerabilities in Git resolved through the Visual Studio update this month. Fourteen CVEs are rated Critical by Microsoft, affecting Windows OS, Office, SharePoint, and SQL.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The DHCP issue caused by the June 2025 update appears to be resolved. It is not reported as a known issue for Windows OS KBs, and some quick querying through Gemini agrees the issue appears to be resolved.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Gemini’s response to the query is below:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;July update server DHCP issue resolved&lt;/p&gt;

&lt;p&gt;Yes, according to information available on July 8, 2025, Microsoft has resolved the DHCP server issue that was caused by the June 2025 security updates.&lt;/p&gt;

&lt;p&gt;Key points:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;June 2025 updates caused the problem: Microsoft's June 2025 Patch Tuesday updates introduced a bug that could cause the DHCP service to freeze or stop responding on Windows Server 2016 through 2025. This issue prevented some clients from renewing their IP addresses.&lt;/li&gt;
	&lt;li&gt;Fix released in July updates: Microsoft released Windows updates on July 8, 2025, and subsequent updates that resolve this issue.&lt;/li&gt;
	&lt;li&gt;Workaround before the fix: Before the July updates were available, the recommended workaround was to uninstall the affected June updates and restart the server, but this left systems vulnerable to security threats patched in those updates.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Windows Server OS updates this month resolve 16 CVEs in Windows Routing and Remote Access Service (RRAS). These vulnerabilities could allow an unauthenticated attacker to convince a user to initiate a connection to a malicious server that could allow them to execute arbitrary code. The attack would require no privileges and could be exploited over the network. Applying the updates to the OS is the best solution, but additional mitigations like restricting RRAS ports to trusted networks or VPN concentrators can limit exposure, as well as employing firewall rules and disabling unused RRAS features.&lt;/p&gt;

&lt;p&gt;Developers have a bit of work to do on their side this month. Microsoft resolved seven CVEs in Git and two additional CVEs that require a Visual studio update this month.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Microsoft SQL (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719" rel="noopener" target="_blank"&gt;CVE-2025-49719&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 7.5. The code maturity is unproven, which would indicate no code samples. A risk-based prioritisation methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome resolved their fourth zero-day exploit on June 30, so from a risk-based prioritisation perspective, Chrome and Edge updates that take the focus leading up to Patch Tuesday. &lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt; was resolved in build 138.9.7204.96/.97 for Windows, 138.0.7204.92/.93 for Mac and 138.0.7204.92 for Linux, which they indicated would roll out over the coming days/weeks.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released three updates for July Patch Tuesday resolving a total of 11 CVEs. The affected products include Ivanti Connect Secure and Policy Secure, Ivanti EPMM and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/july-security-update-2025"&gt;July Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;July update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Google Chrome and Microsoft Edge browsers are the top priority this month. Ensure you have deployed the latest updates to resolve the zero-day exploit (&lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt;) that was identified on June 30.&lt;/li&gt;
	&lt;li&gt;Windows Server OS updates are likely the biggest security priority this month, especially for those who experienced the DHCP issues after the June update and had to uninstall the June update.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Jul 2025 21:17:47 Z</pubDate></item><item><guid isPermaLink="false">6d00f5a5-75cd-4d95-b5b9-2ae31a5fdd82</guid><link>https://www.ivanti.com/en-gb/blog/june-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>June 2025 Patch Tuesday</title><description>&lt;p&gt;June Patch Tuesday is upon us. There has been a lot of activity in the past few weeks. Mid-May was the &lt;a href="https://www.zerodayinitiative.com/blog?tag=Pwn2Own" rel="noopener" target="_blank"&gt;Pwn2Own Berlin 2025 event&lt;/a&gt;, and the $1M USD in rewards that were paid out came with many newly discovered vulnerabilities affecting Microsoft, Google, Mozilla, VMware, NVIDIA, Oracle and other vendors. Since the event, there have been several updates from many of these vendors, so expect a lot of third-party updates to update this month from releases leading up to Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Microsoft released updates resolving 66 CVEs, nine of which are rated Critical. In addition, there is one public disclosure and one zero-day exploit. Updates this month affect Windows, Office, SharePoint, Visual Studio, and .Net. The zero day and public disclosure are both resolved by the Windows OS update this month.&lt;/p&gt;

&lt;p&gt;Third-party updates from Mozilla, Google (including two recent zero-day exploits) and Adobe leading up to Patch Tuesday will add to the load. If your organisation is updating applications like browsers on a weekly basis to keep up with continuous release applications commonly used to target end users, you should be up to date on all but Adobe. If not, you will want to ensure to get these queued up for your patch maintenance.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Web Distributed Authoring and Versioning (WEBDAV) (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) which Microsoft has confirmed to be exploited in the wild. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. Risk-based prioritisation would treat this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB Client (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. The code maturity is Proof-of-Concept and the vulnerability is remotely exploitable, which will make this a desirable target for threat actors. A risk-based prioritisation methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome continues their weekly security update cadence. Expect a Chrome update this week to add to the four releases and 14 CVEs resolved since May Patch Tuesday. This includes two zero-day exploits resolved in the past few weeks (CVE-2025–5419 and CVE-2025–4664).&lt;/p&gt;

&lt;p&gt;Mozilla has released multiple security updates since the Pwn2Own Berlin event. The two CVEs exploited in the event were resolved in the May 17 release (Firefox 138.0.4) and since then, Mozilla has released Firefox 139 and 139.0.4, as well as updates for Firefox ESR and Thunderbird. Ensure you have the latest Mozilla updates queued up this Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Acrobat Reader and six other products, resolving 259 CVEs. 225 of these were included in the Experience Manager update, with hefty contributions from a handful of diligent security researchers.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released one update for June Patch Tuesday resolving a total of three CVEs. The affected product is Ivanti Workspace Control.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/june-security-update"&gt;June Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;June update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the top priority this month with one zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) and one public disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Google Chrome should be a top priority if you have not deployed updates for June 2 and earlier, as it will resolve two zero-day exploits (CVE-2025–5419 and CVE-2025–4664).&lt;/li&gt;
	&lt;li&gt;Browsers in general should be updated weekly to keep up with the continuous release cycle. Edge, Chrome and Firefox received multiple updates since May Patch Tuesday, including multiple high-profile disclosures and zero-day exploits.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 10 Jun 2025 20:52:28 Z</pubDate></item><item><guid isPermaLink="false">5cc993cd-6df8-4ed1-a47c-663a41b6568a</guid><link>https://www.ivanti.com/en-gb/blog/patch-tuesday-may-2025</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>May 2025 Patch Tuesday</title><description>&lt;p&gt;May Patch Tuesday resolves five actively exploited and two publicly disclosed vulnerabilities. Spoiler alert: all five zero-days are resolved by deploying the Windows OS update. Also, this month Windows 11 and Server 2025 updates include some new AI features, but they carry a lot of baggage. Literally – they are around 4GB! New AI features include Recall, Click to Do and Improved Windows Search.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a total of 72 new CVEs this month, six of which are rated Critical. The five zero-day vulnerabilities are rated Important, but using a risk-adjusted scoring model they would all be rated Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709" target="_blank" rel="noopener"&gt;CVE-2025-32709&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain administrator privileges. The vulnerability affects Windows Server 2012 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a pair of Elevation of Privilege vulnerabilities in Windows’ Common Log File System Drive (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706" target="_blank" rel="noopener"&gt;CVE-2025-32706&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701" target="_blank" rel="noopener"&gt;CVE-2025-32701&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerabilities affect all Windows OS versions. The vulnerabilities are confirmed to be exploited in the wild. Microsoft’s severity rating for both CVEs is Important and CVSS 3.1 of 7.8. Risk-based prioritisation warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Microsoft DWM Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400" target="_blank" rel="noopener"&gt;CVE-2025-30400&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerability affects Windows 10, Server 2016 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Memory Corruption vulnerability in Microsoft Scripting Engine (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorised attacker to execute code over a network. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Remote Code Execution vulnerability in Visual Studio (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorised attacker to execute code locally. The vulnerability affects Visual Studio 2019 and 2022. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Identity Spoofing vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685" target="_blank" rel="noopener"&gt;CVE-2025-26685&lt;/a&gt;) that could allow an unauthorised attacker to perform spoofing over an adjacent network. The vulnerability affects Microsoft Defender for Identity. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe has released 13 updates this month resolving 39 CVEs, 33 of which are Critical. For more details, see &lt;a href="https://helpx.adobe.com/security.html" target="_blank" rel="noopener"&gt;Adobe’s Latest Product Security Updates&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release a weekly update shortly, so keep an eye out.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released four updates for May Patch Tuesday resolving a total of four CVEs and one CWE. The affected products include Ivanti Neurons for ITSM (on-prem only), Ivanti ICS, Ivanti Neurons for MDM and Ivanti EPMM.&lt;/p&gt;

&lt;p&gt;The Ivanti EPMM update resolves a medium and a high CVE that when chained together, successful exploitation could lead to unauthenticated remote code execution. Ivanti is aware of a very limited number of customers whose solution has been exploited at the time of disclosure.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/may-2025-security-update"&gt;May Security Update on the Ivanti blog&lt;/a&gt; and &lt;a href="https://www.ivanti.com/en-gb/blog/epmm-security-update"&gt;EPMM Security Updated&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;May update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Windows OS is your top priority this month with five zero-day exploits reported (CVEs).&lt;/li&gt;
	&lt;li&gt;Ivanti EPMM customers should apply either of the mitigation options or update as soon as possible.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 May 2025 22:03:04 Z</pubDate></item><item><guid isPermaLink="false">9dd4f420-4068-40c4-8f10-f8a696fe7f9e</guid><link>https://www.ivanti.com/en-gb/blog/april-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>April 2025 Patch Tuesday</title><description>&lt;p&gt;April Patch Tuesday appears to be a high count of resolved CVEs, but a low number of high priority risks. Microsoft has resolved 121 new unique CVEs this month, 11 of which are rated critical and one known to be exploited. The zero-day vulnerability is in the Windows OS this month, making that your top priority.&lt;/p&gt;

&lt;p&gt;In addition, Adobe has released 12 updates resolving 54 CVEs. Adobe ColdFusion was rated highest (Priority 1) and resolves 15 CVEs. Adobe Commerce and Experience Manager Forms were rated Priority 2 and resolved five CVEs and two CVEs respectively. The rest of the Adobe lineup was Priority 3.&lt;/p&gt;

&lt;p&gt;Update your browsers! Google Chrome updated this Patch Tuesday resolving two additional CVEs. On April 1, both Mozilla Firefox and Google Chrome updated. Mozilla Firefox resolved eight CVEs, and Chrome resolved thirteen CVEs. Microsoft Edge (Chromium) updated on April 3 in response to the April 1 Chrome update, which means we will have an additional Edge update coming later this week.&lt;/p&gt;

&lt;p&gt;Oracle is due to release their quarterly CPU on April 15, so keep an eye out for Oracle updates including Java, which will kick off the domino effect of alternative Java frameworks getting updates through the end of April and into early May.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;) that could allow an attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released updates for most of the Creative Suite including After Effects, Animate, Bridge, Illustrator, Media Encoder, Photoshop and Premiere Pro.&lt;/li&gt;
	&lt;li&gt;Google Chrome released an update resolving two CVEs. Expect Edge to be released later this week.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/#CriticalPatchUpdates" target="_blank" rel="noopener"&gt;Oracle’s quarterly CPU is scheduled for April 15, 2025&lt;/a&gt;. Expect updates for a number of Oracle products, but this release will also kick off the domino effect on all Java frameworks like RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released one update for April Patch Tuesday resolving a total of six CVEs. The affected products include Ivanti EPM 2022 and EPM 2024. For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/april-security-update"&gt;April Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;April update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is your top priority this month, with the only zero-day exploit reported (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Update all of your browsers! Last week Mozilla, Chrome and Edge received updates, and an additional Chrome update was released on Patch Tuesday. If you have not already, you should consider moving browser updates to a weekly cadence to reduce exposure time, as Chrome and Edge will receive weekly updates, and Firefox typically has two to three updates per month.&lt;/li&gt;
	&lt;li&gt;Expect Oracle updates on April 15 and additional updates for Java frameworks over the next few weeks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Apr 2025 21:19:58 Z</pubDate></item><item><guid isPermaLink="false">e742c33b-3072-4692-9dc7-a2b707a818ca</guid><link>https://www.ivanti.com/en-gb/blog/march-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>March 2025 Patch Tuesday</title><description>&lt;p&gt;Here in the Midwest US, we have a saying about March, “In like a lion, out like a lamb.” This is in reference to the month starting with strong winter weather and letting off as the month progresses. In fact, we just had a blizzard that dropped 9-12 inches of snow across most of the region overnight, but a week later I see grass and sunny skies and have shed the winter coat!&lt;/p&gt;

&lt;p&gt;At first glance, March Patch Tuesday looks like a lamb, but this lamb might have the teeth of a lion. The standard lineup of updates resolves 57 CVEs across the Windows OS, Office, .Net and Visual Studio, with a couple of Azure component updates in the mix. Google Chrome updated in the lead up to Patch Tuesday (March 10 update), and Adobe released seven updates, including Adobe Acrobat and Acrobat Reader.&lt;/p&gt;

&lt;p&gt;Now let’s talk teeth. There are seven known exploited CVEs for the March lineup.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved six known exploited CVEs. The zero-day exploits affect the Microsoft Management Console, NTFS, Fast FAT, and the Win32 Kernel Subsystem. All six exploits are rated Important with CVSS scores ranging from 4.6 to 7.8. The good news is all six are resolved by the March Windows OS update, so the majority of the immediate risk is resolved by that one update.&lt;/li&gt;
	&lt;li&gt;Google resolved one known exploited CVE (&lt;a href="https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html" target="_blank" rel="noopener"&gt;CVE-2025-24201&lt;/a&gt;), which according to the release notes from Google is an out of bounds write-in GPU on Mac reported by the Apple Security Engineering and Architecture (SEAR) team – so likely only a concern for Mac users. (Based on Microsoft’s release notes, it looks like Edge has not resolved the five CVEs in the March 10 release.)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Management Console (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633" rel="noopener" target="_blank"&gt;CVE-2025-26633&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker would need to take additional actions to prepare the target environment for exploitation, but the vulnerability allows for a variety of user-targeted tactics to exploit, including instant message, email and web-based attacks scenarios. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24993" rel="noopener" target="_blank"&gt;CVE-2025-24993&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure vulnerability in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24991" rel="noopener" target="_blank"&gt;CVE-2025-24991&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 5.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows Fast FAT File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985" rel="noopener" target="_blank"&gt;CVE-2025-24985&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24984" rel="noopener" target="_blank"&gt;CVE-2025-24984&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 4.6. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Win32 Kernel Subsystem (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983" rel="noopener" target="_blank"&gt;CVE-2025-24983&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects older Windows editions including Windows 10 and Server 2008 to Server 2016. Microsoft has confirmed that this CVE is exploited in the wild. If exploited, the attacker could gain SYSTEM-level privileges. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Microsoft Access (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26630" rel="noopener" target="_blank"&gt;CVE-2025-26630&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Access 2016, Office 2019, Office LTSC 2021 and 2024, and Microsoft 365 Apps for Enterprise. Microsoft has confirmed that this CVE has been publicly disclosed, but the code maturity is set to be unproven. The disclosure could provide attackers with some additional information to formulate an exploit, but the lack of code samples will increase their efforts. Risk-based prioritisation would indicate a slightly higher risk for a disclosure without functional code, but not enough to bump this CVE up to Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities &lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Google Chrome released updates on March 10 resolving five CVEs, including one known exploited CVE (&lt;a href="https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html" rel="noopener" target="_blank"&gt;CVE-2025-24201&lt;/a&gt;). The exploit is documented as an out of bounds write-in GPU on Mac. The priority is higher for macOS than Windows for this update.&lt;/li&gt;
	&lt;li&gt;Adobe released seven updates resolving 37 CVEs. The updates affect Adobe Acrobat and Reader, Illustrator, InDesign, Substance 3D Sampler, Painter, Modeller and Designer. All seven updates are rated priority three and can be handled in the course of your monthly update activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released two updates for the March Patch Tuesday resolving a total of two CVEs. The affected products are Ivanti Secure Access Client (ISAC) and Ivanti Neurons for MDM (N-MDM). For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/en-gb/blog/march-security-update"&gt;March Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;March update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS update is the top priority update this month resolving six known exploited CVEs.&lt;/li&gt;
	&lt;li&gt;The March 10 Google Chrome update resolves one known exploited vulnerability on macOS, making the macOS Chrome update a priority.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Mar 2025 21:27:51 Z</pubDate></item><item><guid isPermaLink="false">807d6ad7-2304-4f8d-9832-4998ee5246dd</guid><link>https://www.ivanti.com/en-gb/blog/february-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>February 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="ojvY_mN7CMc"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;February Patch Tuesday is ramping up with releases from Adobe and Microsoft and an expected release from Google. Adobe resolved 45 CVEs across seven updates. The largest and highest priority is Adobe Commerce, which resolves 30 CVEs. Microsoft is coming down off a huge January release and only resolved 56 new CVEs this February. There are two new zero-day exploits and a revised Secure Boot zero-day in the mix, making the Windows OS a top priority this month.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418" rel="noopener" target="_blank"&gt;CVE-2025-21418&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker who exploited this vulnerability could gain SYSTEM privileges. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Storage (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391" rel="noopener" target="_blank"&gt;CVE-2025-21391&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.1. The vulnerability affects Windows 10 to 11 and Server 2016 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has revised the previously resolved Security Feature Bypass in Secure Boot (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.7. The vulnerability was updated to include Windows 11 24H2 and Server 2025 as they are also affected by this known exploited and publicly exploited vulnerability. Additionally, Microsoft has released a more comprehensive update to all affected versions to fully protect against this vulnerability. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing Vulnerability in NTLM Hash Disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377" rel="noopener" target="_blank"&gt;CVE-2025-21377&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is publicly disclosed. The temporal metrics indicate Exploit Code Maturity is Functional, further increasing the risk of exploitation. Risk-based prioritisation warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Surface (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21194" rel="noopener" target="_blank"&gt;CVE-2025-21194&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.1. The vulnerability affects Microsoft Surface and Surface Dev Kit systems. Microsoft has confirmed that this vulnerability is publicly disclosed, but the code maturity is unproven.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Adobe released updates for InDesign, Commerce, Substance 3D Stager, InCopy, Illustrator, Substance 3D Designer and Photoshop Elements, resolving a total of 45 CVEs. Six of the updates are Priority 3. Adobe Commerce is set to Priority 1. The Commerce update resolves 30 of the 45 total CVEs Adobe resolved this month and warrants more immediate attention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome is expected to update later today, which will trigger updates for Chromium-based browsers including Microsoft Edge, so be on the lookout for Chrome and Edge updates as we proceed through the week.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released five product updates resolving 11 CVEs, four of which are Critical. The affected products include Ivanti Cloud Service Application, Ivanti Neurons for MDM, Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Secure Access Client. At the time of release, Ivanti is not aware of any exploitation or public discloses for the 11 resolved CVEs. For more information, &lt;a href="https://www.ivanti.com/en-gb/blog/february-security-update"&gt;see the February Security Advisory page.&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;February update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Windows is the top priority this month, with three known exploited CVEs, two publicly disclosed vulnerabilities resolved and two Critical CVEs.&lt;/li&gt;
	&lt;li&gt;Browsers are a prime target for attackers to target users. While including browsers in your monthly update process is recommended, it leaves a lot of CVEs exposed in between cycles. It’s recommended to move browsers to a weekly Priority Updates cadence. Mozilla Firefox releases two to three times a month. Google Chrome has been releasing security updates weekly since &lt;a href="https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html" rel="noopener" target="_blank"&gt;August 2023&lt;/a&gt;. The Chromium-based Microsoft Edge has also been releasing weekly. Updating all browsers on a weekly basis is recommended to keep up with the steady stream of security fixes.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Feb 2025 22:45:40 Z</pubDate></item><item><guid isPermaLink="false">6a215177-8914-4bba-be3b-f7c0f8b7422d</guid><link>https://www.ivanti.com/en-gb/blog/january-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>January 2025 Patch Tuesday</title><description>&lt;p&gt;Microsoft has released updates resolving 159 unique CVEs for January. Among the lineup are three zero-day exploits and five publicly disclosed vulnerabilities. The exploited CVEs are all targeting Windows Hyper-V NT Kernel Integration VSP, making the OS update this month your most urgent priority. The public disclosures impact Windows Themes, Windows App Package Installer and three CVEs for Microsoft Access. There are 10 CVEs rated Critical affecting the components of the Windows OS and Microsoft Excel.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved three Elevation of Privilege vulnerabilities in Windows Hyper-V NT Kernel Integration VSP (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333" target="_blank" rel="noopener"&gt;CVE-2025-21333&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334" target="_blank" rel="noopener"&gt;CVE-2025-21334&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335" target="_blank" rel="noopener"&gt;CVE-2025-21335&lt;/a&gt;). All three vulnerabilities are rated Important and each has a CVSSv3.1 score of 7.8. These vulnerabilities affect Microsoft Windows versions 10, 11 and Server 2025. Microsoft is aware of exploitation of these vulnerabilities. Risk-based prioritisation warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing Vulnerability in Windows Themes (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308" rel="noopener" target="_blank"&gt;CVE-2025-21308&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.5. The vulnerability affects Windows 10 and 11 as well as Server 2012 up to Server 2025. The CVE has been publicly disclosed, increasing the risk of exploitation. There are mitigations that could reduce the risk of this vulnerability or future security risks. For more details, refer to the Mitigations section of the CVE page.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows App Package Installer (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275" rel="noopener" target="_blank"&gt;CVE-2025-21275&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Windows versions 10, 11, and Server 2025. If exploited, an attacker could gain SYSTEM level privileges. The CVE has been publicly disclosed, increasing the risk of exploitation.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved three Remote Code Execution vulnerabilities in Microsoft Access (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186" rel="noopener" target="_blank"&gt;CVE-2025-21186&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395" rel="noopener" target="_blank"&gt;CVE-2025-21395&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366" rel="noopener" target="_blank"&gt;CVE-2025-21366&lt;/a&gt;). All three vulnerabilities are rated Important and each has a CVSSv3.1 score of 7.8. The vulnerabilities affect Microsoft Office 2019, Access 2016, Office LTSC 2021 and 2024 and Microsoft 365 Apps. The CVEs have been publicly disclosed, increasing the risk of exploitation.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;p&gt;Oracle’s Quarterly CPU is scheduled to release on January 21, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out, expect all of the Java-based frameworks to update over the next few weeks.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Photoshop, Substance 3D Stager, Illustrator on iPad, Animate and Substance 3D Designer, resolving a total of 14 CVEs. All of the CVEs resolved are rated as Critical, but no exploitation or disclosures have been reported.&lt;/p&gt;

&lt;p&gt;Expect Google Chrome’s weekly security update today or tomorrow along with an update for Microsoft Edge shortly after.&lt;/p&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released three product updates resolving 20 CVEs. The affected products include Ivanti Avalanche, Ivanti Application Control Engine and Ivanti Endpoint Manager. Ivanti is not aware of any exploitation or public disclosures for the 20 resolved CVEs. For more information, see the &lt;a href="https://www.ivanti.com/en-gb/blog/january-security-update"&gt;January Patch Tuesday Security Advisory page&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;January update priorities:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Windows is the top priority this month, with three known exploited CVEs, two publicly disclosed vulnerabilities resolved and eight Critical CVEs.&lt;/li&gt;
	&lt;li&gt;Microsoft Office is next in priority from a risk-based perspective. The update this month resolved three publicly disclosed CVEs in Access and two Critical CVEs in Excel. The two Excel CVEs could use the Preview Pane as an attack vector, making them ideal targets for threat actors.&lt;/li&gt;
	&lt;li&gt;Ensure your browsers are all up to date. Mozilla released last week and Google Chrome and Microsoft Edge update weekly with security fixes.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Jan 2025 23:35:11 Z</pubDate></item><item><guid isPermaLink="false">2d23a90b-0108-4fe0-8836-99b29bc24f8d</guid><link>https://www.ivanti.com/en-gb/blog/november-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>November 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/BLQaT3KTfq0" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;November 2023 Patch Tuesday has arrived and has a lower overall CVE count than previous months, but includes some urgent fixes that organizations will want to take note of. This month is also the first patch cycle for Server 2012 and 2012 R2 extended support (ESU). On the third-party&amp;nbsp;side,&amp;nbsp;Adobe has released updates and an update from Google Chrome Stable Channel has&amp;nbsp;been updated.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/11/patchtues-page-blog_nov2023-2.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved 58 new unique CVEs this month, three of which are critical. Three CVEs have confirmed exploits in the wild. There are also some publicly disclosed vulnerabilities that could be considered at higher risk of being exploited. Products affected include Windows OS, Office&amp;nbsp;365, .Net, ASP.NET, Azure DevOps Server, Visual Studio, Exchange Server&amp;nbsp;and&amp;nbsp;SQL Server.&lt;/p&gt;

&lt;p&gt;Microsoft Server 2012 and 2012 R2 officially reached their end-of-life in October. Today, there are updates available for these server editions if an organization has subscribed to Microsoft ESU.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft zero-day ulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability is Windows DWN Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033" rel="noopener" target="_blank"&gt;CVE-2023-36033&lt;/a&gt;). The CVE is rated as Important by Microsoft and has a CVSS score of 7.8, but exploits have been detected in the wild.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There is proof-of-concept code samples publicly&amp;nbsp;available,&amp;nbsp;making it easy for additional attackers to utilize. No user interaction is required to exploit the&amp;nbsp;vulnerability, and if&amp;nbsp;exploited,&amp;nbsp;an attacker could gain&amp;nbsp;system-level&amp;nbsp;privileges. The vulnerability affects all Windows 10, 11&amp;nbsp;and Server editions. Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036" rel="noopener" target="_blank"&gt;CVE-2023-36036&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 7.8, but exploits have been detected in the wild. No user interaction is required to exploit the&amp;nbsp;vulnerability,&amp;nbsp;and if exploited, an attacker could gain&amp;nbsp;system-levelprivileges. The vulnerability affects Windows 10, 11, and Server 2008 and newer server OS editions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Organizations that are still running Server 2008, 2008 R2, 2012 or 2012 R2 should ensure they are subscribing to a Microsoft ESU subscription or take additional precautions to protect these older server editions. Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025" rel="noopener" target="_blank"&gt;CVE-2023-36025&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 8.8, but exploits have been detected in the wild. An attacker can convince a user to click on a specially crafted URL and bypass Windows Defender SmartScreen checks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability affects Windows 10, 11, and Server 2008 and newer server OS editions. Organizations that are still running Server 2008, 2008 R2, 2012 or 2012 R2 should ensure they are subscribing to a Microsoft ESU subscription or take additional precautions to protect these older server editions.&lt;/p&gt;

&lt;p&gt;Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&lt;/p&gt;

&lt;h2&gt;Microsoft publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Denial of Server vulnerability in ASP.NET (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038" rel="noopener" target="_blank"&gt;CVE-2023-36038&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 8.2. The vulnerability has been publicly&amp;nbsp;disclosed,&amp;nbsp;which increases the risk that threat actors may be developing or will develop an exploit. Under the right&amp;nbsp;conditions,&amp;nbsp;an attacker who successfully exploits this vulnerability could cause a total loss of availability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Office that allows an attacker to bypass the Office Protected&amp;nbsp;View and&amp;nbsp;open in editing mode rather than protected mode (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36413" rel="noopener" target="_blank"&gt;CVE-2023-36413&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 6.5. The vulnerability has been publicly&amp;nbsp;disclosed,&amp;nbsp;which increases the risk that threat actors may be developing or will develop an exploit. The vulnerability affects Microsoft Office and 365 Apps editions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has updated a previously published CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38039" rel="noopener" target="_blank"&gt;CVE-2023-38039&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38545" rel="noopener" target="_blank"&gt;CVE-2023-38545&lt;/a&gt;) affecting HTTP headers and SOCKS5 heap buffer overflow to include an updated version of curl&amp;nbsp;8.4.0,&amp;nbsp;which addresses the vulnerabilities. Organizations that implemented the mitigations provided on&amp;nbsp;October 19th, 2023 should follow the guidance provided in the following documentation: &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/disable-wdac-policies" rel="noopener" target="_blank"&gt;Remove Windows Defender Application Control (WDAC) policies&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Microsoft Exchange vulnerabilities of note&lt;/h2&gt;

&lt;p&gt;Some of these exchange vulnerabilities&amp;nbsp;&lt;a href="https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/" rel="noopener" target="_blank"&gt;caught some recent headlines in early November&amp;nbsp;&lt;/a&gt;because of timing of the disclosures from the researcher not lining up with Microsoft’s release criteria. Some researchers have very hard timeframes, from informing the vendor to releasing details publicly. If the vulnerabilities didn't meet criteria for out-of-band release, then they would fall into the next release cycle. A few of these Exchange CVEs appear to fall into such a case. No exploits or disclosures were reported against the five Exchanges CVEs.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035" rel="noopener" target="_blank"&gt;CVE-2023-36035&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039" rel="noopener" target="_blank"&gt;CVE-2023-36039&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050" rel="noopener" target="_blank"&gt;CVE-2023-36050&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439" rel="noopener" target="_blank"&gt;CVE-2023-36439&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1730" rel="noopener" target="_blank"&gt;CVE-2021-1730&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability (information only change)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party updates&lt;/h2&gt;

&lt;p&gt;Adobe has released updates for 14 products including Adobe Acrobat and Acrobat Reader. Adobe resolved 76 CVEs across the product updates, including 40 Critical CVEs. No exploits or public disclosures have been reported.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Based on Adobe's priorities, these would all fall into their Priority 3 as most of the products are less likely to be targeted (like ColdFusion, InCopy, etc.) Adobe Acrobat and Acrobat Reader is the most likely to be targeted as it is more widely available on systems. Recommendation would be to prioritize&amp;nbsp;&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-54.html" rel="noopener" target="_blank"&gt;APSB23-54&amp;nbsp;: Security update available for Adobe Acrobat and Reader&amp;nbsp;for remediation to be safe&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome has moved to a &lt;a href="https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html" rel="noopener" target="_blank"&gt;weekly release cadence for security updates&lt;/a&gt;. Chrome's stable channel has been updated to 119.0.6045.159 for Mac and Linux and 119.0.6045.159/.160 for Windows and includes 4 CVEs. Expect Chromium-based browsers to update shortly.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 14 Nov 2023 22:18:09 Z</pubDate></item><item><guid isPermaLink="false">ed8387d2-0e74-4acb-be77-b09b5ac119b7</guid><link>https://www.ivanti.com/en-gb/blog/october-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>October 2023 Patch Tuesday</title><description>&lt;p&gt;There's been&amp;nbsp;a long string of zero-day events through September and into the October Patch Tuesday lineup. Apple had five zero-day vulnerabilities across most of their products culminating in their updates that&amp;nbsp;were released&amp;nbsp;on September 26th&amp;nbsp;(which also included the EoL of Big Sur).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google and Mozilla continued to be busy with several zero-day vulnerabilities in&amp;nbsp;the open-source library, Libwebp. This also impacted chromium-based browsers like Microsoft Edge, Opera and others. For more details on the lineup of CVEs leading up to October Patch&amp;nbsp;Tuesday,&amp;nbsp;check out our&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2023/10/06/october-2023-patch-tuesday-forecast/" rel="noopener" target="_blank"&gt;Patch Tuesday Forecast on HelpNetSecurity&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved 104 new CVEs this month, three of which are flagged as exploited. The lineup from Microsoft includes Windows, Office 365, SQL Server, Exchange Server&amp;nbsp;and&amp;nbsp;multiple Azure components. Along with the large lineup of&amp;nbsp;fixes,&amp;nbsp;October also marks the end-of-life for Windows Server 2012 and 2012 R2.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday graphic for October." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/10/patchtues-page-blog_october2023.jpg" /&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft zero-day vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Skype (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763" rel="noopener" target="_blank"&gt;CVE-2023-41763&lt;/a&gt;) which allows an attacker to send a specially crafted network call to a target Skype for Business server. The network call could cause the parsing of an http request made to an arbitrary address. This could disclose IP addresses or port numbers or both to the attacker. The CVE is rated as important and has a CVSSv3.1 of 5.3, but proof-of-concept code has been disclosed and there are exploits detected in the wild. This CVE should be treated as a higher severity than Important due to the risk of exploit.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved an&amp;nbsp;information&amp;nbsp;disclosure vulnerability in WordPad (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563" rel="noopener" target="_blank"&gt;CVE-2023-36563)&lt;/a&gt; which allows the disclosure of NTLM hashes. The CVE is rated as Important and has a CVSSv3.1 of 6.5, but proof-of-concept code has been disclosed and there are exploits detected in the wild. This CVE should be treated as a higher severity than Important due to the risk of exploit.&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved a Denial of Service vulnerability in&amp;nbsp;the HTTP/2&amp;nbsp;protocol (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487" rel="noopener" target="_blank"&gt;CVE-2023-44487&lt;/a&gt;) which allows request cancellation that can reset many streams quickly. The vulnerability has been exploited in the wild since August. The vulnerability has been resolved in the Windows OS and in Visual Studio, .Net and ASP.Net. The CVE&amp;nbsp;doesn't&amp;nbsp;have a CVSS calculated, and Microsoft’s severity is only rated as Important, but due to active exploitation this CVE should be treated as a higher severity.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Windows Server 2012\2012 R2 and Windows 11 21H2 end-of-life&lt;/h2&gt;

&lt;p&gt;This patch Tuesday will include the&amp;nbsp;latest&amp;nbsp;updates for Windows 11 21H2 and Microsoft Server 2012/2012 R2. The later go into Extended Security Support (ESU) starting with a November release, and Microsoft also announced the keys used to&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/deliver-extended-security-updates" rel="noopener" target="_blank"&gt;enable&amp;nbsp;these updates&lt;/a&gt; will be managed as part of Azure Arc. They should be released next week.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;End-of-life software poses a risk to an organization. No public updates will be available for these OS versions going forward. For Windows 11&amp;nbsp;users,&amp;nbsp;this means upgrading to a new Windows 11 branch. For Server 2012\2012 R2&amp;nbsp;it'shighly recommended to subscribe to ESU or migrate to a newer server edition.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Linux zero-day vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-42115 has a whopping 9.8 CVSS and affects the Exim software solution, a message transfer agent (fancy way of saying email server) that’s very popular on Linux (including web hosters), which&amp;nbsp;wasvulnerable to remote code execution. This vulnerability had been reported for over a year to the original developers but never&amp;nbsp;addressed properly&amp;nbsp;and is now public.&amp;nbsp;There's&amp;nbsp;exploit code available in the wild. It particularly affects servers configured with centralized identity management, including in mixed Windows/Linux environments with Active Directory.&lt;/li&gt;
	&lt;li&gt;Exim announced on October 2nd&amp;nbsp;that a security update for exim-4.96.1 and 4.97 has been created to mitigate this CVE and two other zero-days (with three other zero-days remaining unpatched). Exim is an important MTA software because it’s bundled with “control panel”&amp;nbsp;web hosters, including in docker images.&lt;/li&gt;
	&lt;li&gt;CVE-2023-4863 is a 9.1 CVSS heap-based buffer overflow that affects libwebp, which is a library used by countless applications (for example Google Chrome, Firefox or Brave) to render images on screen.&amp;nbsp;It's beenfound to be vulnerable to an exploit, which is already in the wild, and all the applications using&amp;nbsp;it'll&amp;nbsp;be affected&amp;nbsp;—&amp;nbsp;which are essentially any applications that show or process images in the "webp" format (or its derivatives). This is remotely exploitable and requires no interaction to trigger – simply viewing a malicious image is enough to trigger it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Linux vulnerabilities can have a long tail, from the publishing of the CVE to patches being made available by Linux distributions. To monitor the latest Linux CVEs,&amp;nbsp;check out &lt;a href="https://cve.tuxcare.com/els/cve" rel="noopener" target="_blank"&gt;TuxCare’s detailed CVE Tracker&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 10 Oct 2023 22:03:02 Z</pubDate></item></channel></rss>