Post-Patch Tuesday Roundup: November 2025 :: Softcat
Skip to main content
Blog

Post-Patch Tuesday Roundup: November 2025

Welcome to the November 2025 edition of Softcat’s Patch Tuesday roundup, this month’s spotlight falls on major vendors including Microsoft, Adobe, Cisco, SAP, Ivanti, and VMware, each addressing a range of vulnerabilities across their platforms.

Post patch tuesday image 1

Philip Odjidja

Vulnerability Engineer

Notably, several zero-day vulnerabilities have been disclosed — with confirmed reports of active exploitation in the wild.

Microsoft

Microsoft patched 63 CVEs in its November 2025 Patch Tuesday release, with five rated critical, and 58 rated as important. The update focused heavily on privilege escalation and remote code execution threats across Windows and Microsoft software.

Zero-Day Vulnerabilities

CVE-2025-622155- A Windows Kernel elevation of privilege flaw actively exploited in the wild. It allows local privilege escalation to system level through a race condition and double-free flaw. It is rated as important, with a CVSS score of 7.0. No public proof-of-concept (PoC) has been released for CVE-2025-62215, but threat actors have already weaponized it

Critical

CVE-2025-62199 - is a remote code execution (RCE) vulnerability affecting Microsoft Office, carrying a CVSSv3 score of 7.8 and classified as Critical. While Microsoft’s Exploitability Index rates it as "Exploitation Less Likely," the nature of the flaw still warrants close attention. An attacker could leverage this vulnerability through social engineering, distributing a malicious Office document to unsuspecting users. If successfully exploited, it would allow the attacker to execute arbitrary code with the privileges of the targeted user.

 CVE-2025-60724  - is a remote code execution (RCE) vulnerability in the Windows Graphics Device Interface (GDI), carrying a CVSSv3 score of 9.8 and rated Critical. Despite its severity, Microsoft has assessed the likelihood of exploitation as low. An attacker could exploit this flaw by tricking a user into downloading and opening a specially crafted file. The vulnerability stems from a heap-based buffer overflow, which can be triggered to execute arbitrary code on the victim’s system. The high CVSS score and potential for full code execution make this a priority for patching, especially in environments where users frequently handle external files.

CVE-2025-30398 - is a high-severity information disclosure vulnerability in Nuance PowerScribe 360, caused by missing authorization controls in its web interface.The vulnerability stems from missing authorization checks in PowerScribe’s web-based API. This allows an unauthorized attacker to send crafted requests and retrieve sensitive data over the network. It has a CVSS score of 8.1.

Important

CVE-2025-59499 - is a high-severity SQL injection vulnerability in Microsoft SQL Server that allows privilege escalation over a network. The vulnerability stems from improper neutralization of special elements in SQL commands, commonly known as SQL injection. An authenticated attacker can exploit this flaw by injecting malicious SQL into a vulnerable query

CVE-2025-60719, CVE-2025-62213, and CVE-2025-62217 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability. ALL three are EoP vulnerabilities assigned CVSSv3 scores of 7.0 and assessed as “Exploitation More Likely.” A local, authenticated attacker could exploit these vulnerabilities to elevate to SYSTEM level privileges.

CVE-2025-62204 - is a high-severity remote code execution vulnerability in Microsoft SharePoint Server, caused by unsafe deserialization of untrusted data. An attacker with low privileges can exploit this flaw by submitting specially crafted requests that trigger unsafe object deserialization, leading to arbitrary code execution on the server. This vulnerability assigned CVSSv3 scores of 8.0 and assessed as “Exploitation less Likely

 

Adobe

Adobe has released 8 patches this month, addressing 2 critical vulnerabilities

The applications in question are:

 InDesign

 InCopy 

 Photoshop

 Illustrator

 Illustrator on iPad

 Pass

 Substance 3D Stager

 Format Plugins

 

Cisco

Cisco has published 7 advisories in November addressing vulnerabilities 3 critical, 1 high 3 medium. The critical vulnerabilities are CVE-2025-20333, CVE-2025-20363 , , CVE-2025-20354   CVE-2025-20358

 

Check Point

Check Point addressed multiple security vulnerabilities in its November 2025 Patch Tuesday update   highlighting serious vulnerabilities across widely used networking and IoT devices. These advisories underscore the persistent risks posed by command injection, buffer overflows, and unauthenticated access in embedded systems.

 

Ivanti

Ivanti has rolled out critical updates for Ivanti Endpoint Manager, addressing three high-severity vulnerabilities that pose serious risks to enterprise environments. If exploited, these flaws could allow a locally authenticated attacker to write arbitrary files anywhere on disk, potentially leading to privilege escalation or system compromise. The three high vulnerabilities CVE-2025-10918, CVE-2025-9713 and CVE-2025-11622, with the last two resolved vulnerabilities previously disclosed in October 2025.

 

SAP

SAP has released 18 new security notes and 2 updates to October security notes. 3 of these CVEs are rated Critical, 1 high and 14 mediums. The products affected by the Critical or high rated CVEs are

  SQL Anywhere Monitor

  SAP NetWeaver AS Java

  SAP Solution Manager

  SAP CommonCryptoLib

 

VMware

VMware has released a patch for vulnerabilities in the VMware Tanzu products. Many critical & high vulnerabilities were found in Tanzu for Kubernetes Runtime and VMware Tanzu Application Service. These vulnerabilities have been rated as Critical and have a CVSS score of 9.8

To stay protected against emerging threats, it's essential to apply the latest security updates without delay. Timely patching helps safeguard systems from known vulnerabilities and minimizes exposure to potential exploits.