Patch Tuesday de octubre 2025: Microsoft corrige 6 vulnerabilidades Zero-Day y 172 fallos en total

Esta versión incluye los siguientes 74 CVE de Microsoft y 2 avisos

Este martes, Microsoft publicó su actualización de seguridad de octubre de 2025, conocida como Patch Tuesday, que incluye correcciones para 172 vulnerabilidades, de las cuales seis son de tipo Zero-Day (ya explotadas o divulgadas públicamente antes del parche).
Ocho de estas vulnerabilidades fueron catalogadas como críticas, cinco permitiendo ejecución remota de código (RCE) y tres con impacto de elevación de privilegios (EoP).

Este Patch Tuesday marca además el fin oficial del soporte gratuito para Windows 10, siendo la última ronda de actualizaciones gratuitas para ese sistema operativo. A partir de ahora, los usuarios y empresas deberán suscribirse al programa de Extended Security Updates (ESU) para continuar recibiendo parches de seguridad.


Distribución general de vulnerabilidades

  • 80 Elevación de privilegios (EoP)

  • 11 Bypass de características de seguridad

  • 31 Ejecución remota de código (RCE)

  • 28 Divulgación de información

  • 11 Denegación de servicio (DoS)

  • 10 Suplantación o spoofing


Seis vulnerabilidades Zero-Day destacadas

1. CVE-2025-24990 — Elevación de privilegio en driver Agere Modem

Microsoft eliminó el driver ltmdm64.sys vulnerable a escalada de privilegios. Su eliminación provocará que hardware de fax/modem deje de funcionar.

2. CVE-2025-59230 — Windows Remote Access Connection Manager

Falla explotada activamente que permitía elevar privilegios a SYSTEM mediante controles de acceso incorrectos.

3. CVE-2025-47827 — Secure Boot bypass en IGEL OS < 11

Permite el montaje de sistemas root falsos mediante imágenes SquashFS no verificadas, afectando el mecanismo de Secure Boot.

4. CVE-2025-0033 — Corrupción RMP en AMD EPYC (SNP Initialization)

Afecta la integridad de memoria en entornos Azure Confidential Computing, aunque Microsoft afirma que existen controles compensatorios en la nube.

5. CVE-2025-24052 — Variante adicional del fallo Agere Modem

Vulnerabilidad similar a CVE-2025-24990 que afecta incluso si el módem no está en uso.

6. CVE-2025-2884 — Lectura fuera de límites en TCG TPM 2.0

Error en la función CryptHmacSign del estándar TPM 2.0 que podría permitir filtración de datos o denegación de servicio.


Otros proveedores con actualizaciones críticas

Además de Microsoft, otras empresas publicaron actualizaciones importantes durante octubre de 2025:

  • Adobe: parches para múltiples productos.

  • Cisco: correcciones para IOS, Unified CM y Cyber Vision Center.

  • Draytek: actualización urgente por RCE pre-auth en routers Vigor.

  • Ivanti: parches para EPMM y Neurons for MDM.

  • Oracle: dos zero-days en E-Business Suite.

  • Redis: vulnerabilidad RCE de severidad máxima.

  • SAP: corrección crítica en NetWeaver.

  • Synacor: parche para zero-day en Zimbra Collaboration Suite.


Implicaciones para las empresas

Las organizaciones deben priorizar la aplicación inmediata de parches, especialmente en componentes de Windows, Azure Entra ID, Copilot, Office y Redis Enterprise.
Este ciclo de actualizaciones refleja la creciente complejidad del ecosistema Microsoft, donde vulnerabilidades cruzan tanto productos locales como servicios cloud y frameworks de desarrollo (.NET, Visual Studio, Azure Monitor, entre otros).


Recomendaciones del equipo CTI

  1. Implementar los parches críticos (RCE y EoP) dentro de las primeras 72 horas.

  2. Revisar controladores antiguos o de terceros, especialmente los incluidos de fábrica como Agere Modem.

  3. Auditar configuraciones de Secure Boot y TPM 2.0.

  4. Validar políticas de Azure Confidential Computing si se usan instancias AMD EPYC.

  5. Monitorear los registros de sistema y endpoints tras aplicar parches, buscando fallos post-actualización.

  6. Actualizar Office y SharePoint por su exposición a RCEs.

  7. Documentar todas las actualizaciones dentro del proceso de patch management corporativo.


Tabla completa de vulnerabilidades (CVE) — Octubre 2025

TagCVE IDCVE TitleSeverity
.NETCVE-2025-55247.NET Elevation of Privilege VulnerabilityImportant
.NET, .NET Framework, Visual StudioCVE-2025-55248.NET, .NET Framework, and Visual Studio Information Disclosure VulnerabilityImportant
Active Directory Federation ServicesCVE-2025-59258Windows Active Directory Federation Services (ADFS) Information Disclosure VulnerabilityImportant
Agere Windows Modem DriverCVE-2025-24990Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
Agere Windows Modem DriverCVE-2025-24052Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
AMD Restricted Memory PageCVE-2025-0033AMD CVE-2025-0033: RMP Corruption During SNP InitializationCritical
ASP.NET CoreCVE-2025-55315ASP.NET Security Feature Bypass VulnerabilityImportant
Azure Connected Machine AgentCVE-2025-47989Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Azure Connected Machine AgentCVE-2025-58724Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Azure Entra IDCVE-2025-59218Azure Entra ID Elevation of Privilege VulnerabilityCritical
Azure Entra IDCVE-2025-59246Azure Entra ID Elevation of Privilege VulnerabilityCritical
Azure LocalCVE-2025-55697Azure Local Elevation of Privilege VulnerabilityImportant
Azure MonitorCVE-2025-55321Azure Monitor Log Analytics Spoofing VulnerabilityCritical
Azure Monitor AgentCVE-2025-59285Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
Azure Monitor AgentCVE-2025-59494Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
Azure PlayFabCVE-2025-59247Azure PlayFab Elevation of Privilege VulnerabilityCritical
Confidential Azure Container InstancesCVE-2025-59292Azure Compute Gallery Elevation of Privilege VulnerabilityCritical
Confidential Azure Container InstancesCVE-2025-59291Confidential Azure Container Instances Elevation of Privilege VulnerabilityCritical
Connected Devices Platform Service (Cdpsvc)CVE-2025-59191Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Connected Devices Platform Service (Cdpsvc)CVE-2025-55326Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution VulnerabilityImportant
Connected Devices Platform Service (Cdpsvc)CVE-2025-58719Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CopilotCVE-2025-59272Copilot Spoofing VulnerabilityCritical
CopilotCVE-2025-59252M365 Copilot Spoofing VulnerabilityCritical
CopilotCVE-2025-59286Copilot Spoofing VulnerabilityCritical
Data Sharing Service ClientCVE-2025-59200Data Sharing Service Spoofing VulnerabilityImportant
GamesCVE-2025-59489MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerabilityImportant
GitHubCVE-2025-59288Playwright Spoofing VulnerabilityModerate
Inbox COM ObjectsCVE-2025-58735Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58732Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-59282Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58733Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58734Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58738Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58731Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58730Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58736Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Internet ExplorerCVE-2025-59295Windows URL Parsing Remote Code Execution VulnerabilityImportant
JDBC Driver for SQL ServerCVE-2025-59250JDBC Driver for SQL Server Spoofing VulnerabilityImportant
MarinerCVE-2025-39943ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transferCritical
MarinerCVE-2025-39946tls: make sure to abort the stream if headers are bogusModerate
MarinerCVE-2025-39942ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_sizeModerate
MarinerCVE-2025-39951um: virtio_uml: Fix use-after-free after put_device in probeModerate
MarinerCVE-2025-39932smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)Moderate
MarinerCVE-2025-39949qed: Don’t collect too many protection override GRC elementsModerate
MarinerCVE-2025-39937net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointerModerate
MarinerCVE-2025-39955tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().Moderate
MarinerCVE-2025-39895sched: Fix sched_numa_find_nth_cpu() if mask offlineModerate
MarinerCVE-2025-11413GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-boundsModerate
MarinerCVE-2025-11414GNU Binutils Linker elflink.c get_link_hash_entry out-of-boundsModerate
MarinerCVE-2025-39938ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failedModerate
MarinerCVE-2025-11495GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflowModerate
MarinerCVE-2025-39934drm: bridge: anx7625: Fix NULL pointer dereference with early IRQModerate
MarinerCVE-2025-39929smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error pathModerate
MarinerCVE-2025-39945cnic: Fix use-after-free bugs in cnic_delete_taskImportant
MarinerCVE-2025-39907mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC bufferCritical
MarinerCVE-2025-39913tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.Moderate
MarinerCVE-2025-39952wifi: wilc1000: avoid buffer overflow in WID string configurationImportant
MarinerCVE-2025-39940dm-stripe: fix a possible integer overflowModerate
MarinerCVE-2025-39953cgroup: split cgroup_destroy_wq into 3 workqueuesModerate
MarinerCVE-2023-53469af_unix: Fix null-ptr-deref in unix_stream_sendpage().Important
MarinerCVE-2025-39914tracing: Silence warning when chunk allocation fails in trace_pid_writeModerate
MarinerCVE-2025-39905net: phylink: add lock for serializing concurrent pl->phydev writes with resolverModerate
MarinerCVE-2025-39920pcmcia: Add error handling for add_interval() in do_validate_mem()Moderate
MarinerCVE-2025-39911i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error pathLow
MarinerCVE-2025-39958iommu/s390: Make attach succeed when the device was surprise removedLow
MarinerCVE-2025-8291ZIP64 End of Central Directory (EOCD) Locator record offset not checkedModerate
MarinerCVE-2025-39957wifi: mac80211: increase scan_ies_len for S1GLow
MarinerCVE-2025-46818Redis: Authenticated users can execute LUA scripts as a different userModerate
MarinerCVE-2025-46817Lua library commands may lead to integer overflow and potential RCEImportant
MarinerCVE-2022-50502mm: /proc/pid/smaps_rollup: fix no vma’s null-derefModerate
MarinerCVE-2025-39944octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()Important
MarinerCVE-2025-11234Qemu-kvm: vnc websocket handshake use-after-freeModerate
MarinerCVE-2025-49844Redis Lua Use-After-Free may lead to remote code executionCritical
MarinerCVE-2025-10729Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVGImportant
MarinerCVE-2025-39961iommu/amd/pgtbl: Fix possible race while increase page table levelModerate
MarinerCVE-2025-61984OpenSSH < 10.1 control characters in usernames leading to potential code execution via ProxyCommandLow
MarinerCVE-2025-46819Redis DoS via specially crafted LUA scriptsModerate
MarinerCVE-2025-37727Elasticsearch Insertion of sensitive information in log fileModerate
MarinerCVE-2025-11412GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-boundsModerate
MarinerCVE-2025-39931crypto: af_alg – Set merge to zero early in af_alg_sendmsgModerate
MarinerCVE-2025-39933smb: client: let recv_done verify data_offset, data_length and remaining_data_lengthModerate
MarinerCVE-2025-39947net/mlx5e: Harden uplink netdev access against device unbindModerate
MarinerCVE-2025-61985OpenSSH < 10.1 allows ‘’ in ssh:// URI leading to potential code execution via ProxyCommandLow
MarinerCVE-2025-10728Uncontrolled recursion in Qt SVG moduleImportant
MarinerCVE-2025-39916mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()Moderate
MarinerCVE-2025-39902mm/slub: avoid accessing metadata when pointer is invalid in object_err()Moderate
MarinerCVE-2025-39923dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/eesModerate
MarinerCVE-2025-39898e1000e: fix heap overflow in e1000_set_eepromCritical
MarinerCVE-2025-39925can: j1939: implement NETDEV_UNREGISTER notification handlerCritical
MarinerCVE-2025-39891wifi: mwifiex: Initialize the chan_stats array to zeroModerate
MarinerCVE-2025-39927ceph: fix race condition validating r_parent before applying stateModerate
MarinerCVE-2025-39901i40e: remove read access to debugfs filesImportant
MarinerCVE-2025-39910mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()Critical
MarinerCVE-2025-39909mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()Moderate
Microsoft Brokering File SystemCVE-2025-48004Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-59189Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Configuration ManagerCVE-2025-55320Configuration Manager Elevation of Privilege VulnerabilityImportant
Microsoft Configuration ManagerCVE-2025-59213Configuration Manager Elevation of Privilege VulnerabilityImportant
Microsoft Defender for LinuxCVE-2025-59497Microsoft Defender for Linux Denial of Service VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-11213Chromium: CVE-2025-11213 Inappropriate implementation in OmniboxUnknown
Microsoft Edge (Chromium-based)CVE-2025-11210Chromium: CVE-2025-11210 Side-channel information leakage in TabUnknown
Microsoft Edge (Chromium-based)CVE-2025-11460Chromium: CVE-2025-11460 Use after free in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11458Chromium: CVE-2025-11458 Heap buffer overflow in SyncUnknown
Microsoft Edge (Chromium-based)CVE-2025-11215Chromium: CVE-2025-11215 Off by one error in V8Unknown
Microsoft Edge (Chromium-based)CVE-2025-11216Chromium: CVE-2025-11216 Inappropriate implementation in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11208Chromium: CVE-2025-11208 Inappropriate implementation in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11212Chromium: CVE-2025-11212 Inappropriate implementation in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11211Chromium: CVE-2025-11211 Out of bounds read in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11205Chromium: CVE-2025-11205 Heap buffer overflow in WebGPUUnknown
Microsoft Edge (Chromium-based)CVE-2025-11207Chromium: CVE-2025-11207 Side-channel information leakage in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11209Chromium: CVE-2025-11209 Inappropriate implementation in OmniboxUnknown
Microsoft Edge (Chromium-based)CVE-2025-11206Chromium: CVE-2025-11206 Heap buffer overflow in VideoUnknown
Microsoft Edge (Chromium-based)CVE-2025-11219Chromium: CVE-2025-11219 Use after free in V8Unknown
Microsoft Exchange ServerCVE-2025-59248Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-59249Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-53782Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Failover Cluster Virtual DriverCVE-2025-59260Microsoft Failover Cluster Virtual Driver Information Disclosure VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-59195Microsoft Graphics Component Denial of Service VulnerabilityImportant
Microsoft Graphics ComponentCVE-2016-9535MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow VulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-59261Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-49708Microsoft Graphics Component Elevation of Privilege VulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-59205Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft OfficeCVE-2025-59229Microsoft Office Denial of Service VulnerabilityImportant
Microsoft OfficeCVE-2025-59227Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-59234Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-59223Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59224Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59225Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59232Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59235Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59233Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59231Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59236Microsoft Excel Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-59243Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office PowerPointCVE-2025-59238Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-59237Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-59228Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office VisioCVE-2025-59226Microsoft Office Visio Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-59222Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-59221Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft PowerShellCVE-2025-25004PowerShell Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2025-55701Windows Authentication Elevation of Privilege VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2025-54957MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoderImportant
Microsoft Windows Search ComponentCVE-2025-59198Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2025-59190Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2025-59253Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows SpeechCVE-2025-58715Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
Microsoft Windows SpeechCVE-2025-58716Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
Network Connection Status Indicator (NCSI)CVE-2025-59201Network Connection Status Indicator (NCSI) Elevation of Privilege VulnerabilityImportant
NtQueryInformation Token function (ntifs.h)CVE-2025-55696NtQueryInformation Token function (ntifs.h) Elevation of Privilege VulnerabilityImportant
Redis EnterpriseCVE-2025-59271Redis Enterprise Elevation of Privilege VulnerabilityCritical
Remote Desktop ClientCVE-2025-58718Remote Desktop Client Remote Code Execution VulnerabilityImportant
Software Protection Platform (SPP)CVE-2025-59199Software Protection Platform (SPP) Elevation of Privilege VulnerabilityImportant
Storport.sys DriverCVE-2025-59192Storport.sys Driver Elevation of Privilege VulnerabilityImportant
TCG TPM2.0CVE-2025-2884Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementationImportant
Virtual Secure ModeCVE-2025-48813Virtual Secure Mode Spoofing VulnerabilityImportant
Visual StudioCVE-2025-55240Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-54132GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram ToolImportant
Windows Ancillary Function Driver for WinSockCVE-2025-58714Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-59242Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59277Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59278Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59275Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows BitLockerCVE-2025-55337Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55332Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55333Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55330Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55338Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55682Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-59290Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-58728Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-59289Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-55680Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-55336Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityImportant
Windows COMCVE-2025-58725Windows COM+ Event System Service Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2025-58727Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows Core ShellCVE-2025-59185NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Core ShellCVE-2025-59244NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Cryptographic ServicesCVE-2025-58720Windows Cryptographic Services Information Disclosure VulnerabilityImportant
Windows Device Association Broker serviceCVE-2025-50174Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
Windows Device Association Broker serviceCVE-2025-55677Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-53150Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-50175Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows DirectXCVE-2025-55678DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
Windows DirectXCVE-2025-55698DirectX Graphics Kernel Denial of Service VulnerabilityImportant
Windows DWMCVE-2025-58722Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWMCVE-2025-55681Desktop Windows Manager Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-59255Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-59254Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows Error ReportingCVE-2025-55692Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
Windows Error ReportingCVE-2025-55694Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
Windows ETL ChannelCVE-2025-59197Windows ETL Channel Information Disclosure VulnerabilityImportant
Windows Failover ClusterCVE-2025-59188Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
Windows Failover ClusterCVE-2025-47979Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
Windows File ExplorerCVE-2025-59214Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows File ExplorerCVE-2025-58739Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows Health and Optimized Experiences ServiceCVE-2025-59241Windows Health and Optimized Experiences Elevation of Privilege VulnerabilityImportant
Windows HelloCVE-2025-53139Windows Hello Security Feature Bypass VulnerabilityImportant
Windows High Availability ServicesCVE-2025-59184Storage Spaces Direct Information Disclosure VulnerabilityImportant
Windows Hyper-VCVE-2025-55328Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55679Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-55683Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-59207Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55334Windows Kernel Security Feature Bypass VulnerabilityImportant
Windows KernelCVE-2025-59186Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-55693Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-59194Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-59187Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-50152Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55699Windows Kernel Information Disclosure VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-58729Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-59257Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-59259Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Management ServicesCVE-2025-59193Windows Management Services Elevation of Privilege VulnerabilityImportant
Windows Management ServicesCVE-2025-59204Windows Management Services Information Disclosure VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-59208Windows MapUrlToZone Information Disclosure VulnerabilityImportant
Windows NDISCVE-2025-55339Windows Network Driver Interface Specification Driver Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-55335Windows NTFS Elevation of Privilege VulnerabilityImportant
Windows NTLMCVE-2025-59284Windows NTLM Spoofing VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55331Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55689Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55685Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55686Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55690Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55684Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55688Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55691Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows Push Notification CoreCVE-2025-59209Windows Push Notification Information Disclosure VulnerabilityImportant
Windows Push Notification CoreCVE-2025-59211Windows Push Notification Information Disclosure VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2025-59230Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote DesktopCVE-2025-58737Remote Desktop Protocol Remote Code Execution VulnerabilityImportant
Windows Remote Desktop ProtocolCVE-2025-55340Windows Remote Desktop Protocol Security Feature BypassImportant
Windows Remote Desktop ServicesCVE-2025-59202Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
Windows Remote Procedure CallCVE-2025-59502Remote Procedure Call Denial of Service VulnerabilityModerate
Windows Resilient File System (ReFS)CVE-2025-55687Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
Windows ReFS Deduplication ServiceCVE-2025-59210Windows ReFS Deduplication Service Elevation of Privilege VulnerabilityImportant
Windows ReFS Deduplication ServiceCVE-2025-59206Windows ReFS Deduplication Service Elevation of Privilege VulnerabilityImportant
Windows RRASCVE-2025-58717Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows RRASCVE-2025-55700Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Secure BootCVE-2025-47827Secure Boot bypass in IGEL OS before 11Important
Windows Server Update ServiceCVE-2025-59287Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityCritical
Windows SMB ClientCVE-2025-59280Windows SMB Client Tampering VulnerabilityImportant
Windows SMB ServerCVE-2025-58726Windows SMB Server Elevation of Privilege VulnerabilityImportant
Windows SSDP ServiceCVE-2025-59196Windows SSDP Service Elevation of Privilege VulnerabilityImportant
Windows StateRepository APICVE-2025-59203Windows State Repository API Server File Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-55325Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Taskbar LiveCVE-2025-59294Windows Taskbar Live Preview Information Disclosure VulnerabilityImportant
Windows USB Video DriverCVE-2025-55676Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
Windows VBS EnclaveCVE-2025-53717Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityImportant
Windows WLAN Auto Config ServiceCVE-2025-55695Windows WLAN AutoConfig Service Information Disclosure VulnerabilityImportant
XboxCVE-2025-53768Xbox IStorageService Elevation of Privilege VulnerabilityImportant
XBox Gaming ServicesCVE-2025-59281Xbox Gaming Services Elevation of Privilege VulnerabilityImportant

Conclusión

El Patch Tuesday de octubre de 2025 demuestra el ritmo acelerado al que evolucionan las superficies de ataque en entornos Microsoft. Desde el kernel y los controladores heredados hasta los servicios en la nube, los atacantes aprovechan cualquier punto débil disponible.
Actualizar los sistemas de inmediato no es solo una buena práctica: es una medida esencial de defensa activa.

Related Post