Este martes, Microsoft publicó su actualización de seguridad de octubre de 2025, conocida como Patch Tuesday, que incluye correcciones para 172 vulnerabilidades, de las cuales seis son de tipo Zero-Day (ya explotadas o divulgadas públicamente antes del parche).
Ocho de estas vulnerabilidades fueron catalogadas como críticas, cinco permitiendo ejecución remota de código (RCE) y tres con impacto de elevación de privilegios (EoP).
Este Patch Tuesday marca además el fin oficial del soporte gratuito para Windows 10, siendo la última ronda de actualizaciones gratuitas para ese sistema operativo. A partir de ahora, los usuarios y empresas deberán suscribirse al programa de Extended Security Updates (ESU) para continuar recibiendo parches de seguridad.
Distribución general de vulnerabilidades
80 Elevación de privilegios (EoP)
11 Bypass de características de seguridad
31 Ejecución remota de código (RCE)
28 Divulgación de información
11 Denegación de servicio (DoS)
10 Suplantación o spoofing
Seis vulnerabilidades Zero-Day destacadas
1. CVE-2025-24990 — Elevación de privilegio en driver Agere Modem
Microsoft eliminó el driver ltmdm64.sys vulnerable a escalada de privilegios. Su eliminación provocará que hardware de fax/modem deje de funcionar.
2. CVE-2025-59230 — Windows Remote Access Connection Manager
Falla explotada activamente que permitía elevar privilegios a SYSTEM mediante controles de acceso incorrectos.
3. CVE-2025-47827 — Secure Boot bypass en IGEL OS < 11
Permite el montaje de sistemas root falsos mediante imágenes SquashFS no verificadas, afectando el mecanismo de Secure Boot.
4. CVE-2025-0033 — Corrupción RMP en AMD EPYC (SNP Initialization)
Afecta la integridad de memoria en entornos Azure Confidential Computing, aunque Microsoft afirma que existen controles compensatorios en la nube.
5. CVE-2025-24052 — Variante adicional del fallo Agere Modem
Vulnerabilidad similar a CVE-2025-24990 que afecta incluso si el módem no está en uso.
6. CVE-2025-2884 — Lectura fuera de límites en TCG TPM 2.0
Error en la función CryptHmacSign del estándar TPM 2.0 que podría permitir filtración de datos o denegación de servicio.
Otros proveedores con actualizaciones críticas
Además de Microsoft, otras empresas publicaron actualizaciones importantes durante octubre de 2025:
Adobe: parches para múltiples productos.
Cisco: correcciones para IOS, Unified CM y Cyber Vision Center.
Draytek: actualización urgente por RCE pre-auth en routers Vigor.
Ivanti: parches para EPMM y Neurons for MDM.
Oracle: dos zero-days en E-Business Suite.
Redis: vulnerabilidad RCE de severidad máxima.
SAP: corrección crítica en NetWeaver.
Synacor: parche para zero-day en Zimbra Collaboration Suite.
Implicaciones para las empresas
Las organizaciones deben priorizar la aplicación inmediata de parches, especialmente en componentes de Windows, Azure Entra ID, Copilot, Office y Redis Enterprise.
Este ciclo de actualizaciones refleja la creciente complejidad del ecosistema Microsoft, donde vulnerabilidades cruzan tanto productos locales como servicios cloud y frameworks de desarrollo (.NET, Visual Studio, Azure Monitor, entre otros).
Recomendaciones del equipo CTI
Implementar los parches críticos (RCE y EoP) dentro de las primeras 72 horas.
Revisar controladores antiguos o de terceros, especialmente los incluidos de fábrica como Agere Modem.
Auditar configuraciones de Secure Boot y TPM 2.0.
Validar políticas de Azure Confidential Computing si se usan instancias AMD EPYC.
Monitorear los registros de sistema y endpoints tras aplicar parches, buscando fallos post-actualización.
Actualizar Office y SharePoint por su exposición a RCEs.
Documentar todas las actualizaciones dentro del proceso de patch management corporativo.
Tabla completa de vulnerabilidades (CVE) — Octubre 2025
| Tag | CVE ID | CVE Title | Severity |
|---|---|---|---|
| .NET | CVE-2025-55247 | .NET Elevation of Privilege Vulnerability | Important |
| .NET, .NET Framework, Visual Studio | CVE-2025-55248 | .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability | Important |
| Active Directory Federation Services | CVE-2025-59258 | Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability | Important |
| Agere Windows Modem Driver | CVE-2025-24990 | Windows Agere Modem Driver Elevation of Privilege Vulnerability | Important |
| Agere Windows Modem Driver | CVE-2025-24052 | Windows Agere Modem Driver Elevation of Privilege Vulnerability | Important |
| AMD Restricted Memory Page | CVE-2025-0033 | AMD CVE-2025-0033: RMP Corruption During SNP Initialization | Critical |
| ASP.NET Core | CVE-2025-55315 | ASP.NET Security Feature Bypass Vulnerability | Important |
| Azure Connected Machine Agent | CVE-2025-47989 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Important |
| Azure Connected Machine Agent | CVE-2025-58724 | Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability | Important |
| Azure Entra ID | CVE-2025-59218 | Azure Entra ID Elevation of Privilege Vulnerability | Critical |
| Azure Entra ID | CVE-2025-59246 | Azure Entra ID Elevation of Privilege Vulnerability | Critical |
| Azure Local | CVE-2025-55697 | Azure Local Elevation of Privilege Vulnerability | Important |
| Azure Monitor | CVE-2025-55321 | Azure Monitor Log Analytics Spoofing Vulnerability | Critical |
| Azure Monitor Agent | CVE-2025-59285 | Azure Monitor Agent Elevation of Privilege Vulnerability | Important |
| Azure Monitor Agent | CVE-2025-59494 | Azure Monitor Agent Elevation of Privilege Vulnerability | Important |
| Azure PlayFab | CVE-2025-59247 | Azure PlayFab Elevation of Privilege Vulnerability | Critical |
| Confidential Azure Container Instances | CVE-2025-59292 | Azure Compute Gallery Elevation of Privilege Vulnerability | Critical |
| Confidential Azure Container Instances | CVE-2025-59291 | Confidential Azure Container Instances Elevation of Privilege Vulnerability | Critical |
| Connected Devices Platform Service (Cdpsvc) | CVE-2025-59191 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | Important |
| Connected Devices Platform Service (Cdpsvc) | CVE-2025-55326 | Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability | Important |
| Connected Devices Platform Service (Cdpsvc) | CVE-2025-58719 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | Important |
| Copilot | CVE-2025-59272 | Copilot Spoofing Vulnerability | Critical |
| Copilot | CVE-2025-59252 | M365 Copilot Spoofing Vulnerability | Critical |
| Copilot | CVE-2025-59286 | Copilot Spoofing Vulnerability | Critical |
| Data Sharing Service Client | CVE-2025-59200 | Data Sharing Service Spoofing Vulnerability | Important |
| Games | CVE-2025-59489 | MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability | Important |
| GitHub | CVE-2025-59288 | Playwright Spoofing Vulnerability | Moderate |
| Inbox COM Objects | CVE-2025-58735 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58732 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-59282 | Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58733 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58734 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58738 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58731 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58730 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Inbox COM Objects | CVE-2025-58736 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Internet Explorer | CVE-2025-59295 | Windows URL Parsing Remote Code Execution Vulnerability | Important |
| JDBC Driver for SQL Server | CVE-2025-59250 | JDBC Driver for SQL Server Spoofing Vulnerability | Important |
| Mariner | CVE-2025-39943 | ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer | Critical |
| Mariner | CVE-2025-39946 | tls: make sure to abort the stream if headers are bogus | Moderate |
| Mariner | CVE-2025-39942 | ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size | Moderate |
| Mariner | CVE-2025-39951 | um: virtio_uml: Fix use-after-free after put_device in probe | Moderate |
| Mariner | CVE-2025-39932 | smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) | Moderate |
| Mariner | CVE-2025-39949 | qed: Don’t collect too many protection override GRC elements | Moderate |
| Mariner | CVE-2025-39937 | net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer | Moderate |
| Mariner | CVE-2025-39955 | tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). | Moderate |
| Mariner | CVE-2025-39895 | sched: Fix sched_numa_find_nth_cpu() if mask offline | Moderate |
| Mariner | CVE-2025-11413 | GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds | Moderate |
| Mariner | CVE-2025-11414 | GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds | Moderate |
| Mariner | CVE-2025-39938 | ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed | Moderate |
| Mariner | CVE-2025-11495 | GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow | Moderate |
| Mariner | CVE-2025-39934 | drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ | Moderate |
| Mariner | CVE-2025-39929 | smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path | Moderate |
| Mariner | CVE-2025-39945 | cnic: Fix use-after-free bugs in cnic_delete_task | Important |
| Mariner | CVE-2025-39907 | mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer | Critical |
| Mariner | CVE-2025-39913 | tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. | Moderate |
| Mariner | CVE-2025-39952 | wifi: wilc1000: avoid buffer overflow in WID string configuration | Important |
| Mariner | CVE-2025-39940 | dm-stripe: fix a possible integer overflow | Moderate |
| Mariner | CVE-2025-39953 | cgroup: split cgroup_destroy_wq into 3 workqueues | Moderate |
| Mariner | CVE-2023-53469 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | Important |
| Mariner | CVE-2025-39914 | tracing: Silence warning when chunk allocation fails in trace_pid_write | Moderate |
| Mariner | CVE-2025-39905 | net: phylink: add lock for serializing concurrent pl->phydev writes with resolver | Moderate |
| Mariner | CVE-2025-39920 | pcmcia: Add error handling for add_interval() in do_validate_mem() | Moderate |
| Mariner | CVE-2025-39911 | i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path | Low |
| Mariner | CVE-2025-39958 | iommu/s390: Make attach succeed when the device was surprise removed | Low |
| Mariner | CVE-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | Moderate |
| Mariner | CVE-2025-39957 | wifi: mac80211: increase scan_ies_len for S1G | Low |
| Mariner | CVE-2025-46818 | Redis: Authenticated users can execute LUA scripts as a different user | Moderate |
| Mariner | CVE-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | Important |
| Mariner | CVE-2022-50502 | mm: /proc/pid/smaps_rollup: fix no vma’s null-deref | Moderate |
| Mariner | CVE-2025-39944 | octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() | Important |
| Mariner | CVE-2025-11234 | Qemu-kvm: vnc websocket handshake use-after-free | Moderate |
| Mariner | CVE-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | Critical |
| Mariner | CVE-2025-10729 | Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG | Important |
| Mariner | CVE-2025-39961 | iommu/amd/pgtbl: Fix possible race while increase page table level | Moderate |
| Mariner | CVE-2025-61984 | OpenSSH < 10.1 control characters in usernames leading to potential code execution via ProxyCommand | Low |
| Mariner | CVE-2025-46819 | Redis DoS via specially crafted LUA scripts | Moderate |
| Mariner | CVE-2025-37727 | Elasticsearch Insertion of sensitive information in log file | Moderate |
| Mariner | CVE-2025-11412 | GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds | Moderate |
| Mariner | CVE-2025-39931 | crypto: af_alg – Set merge to zero early in af_alg_sendmsg | Moderate |
| Mariner | CVE-2025-39933 | smb: client: let recv_done verify data_offset, data_length and remaining_data_length | Moderate |
| Mariner | CVE-2025-39947 | net/mlx5e: Harden uplink netdev access against device unbind | Moderate |
| Mariner | CVE-2025-61985 | OpenSSH < 10.1 allows ‘ |

