{"id":5755,"date":"2025-11-12T03:03:27","date_gmt":"2025-11-12T03:03:27","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5755"},"modified":"2025-11-12T03:03:27","modified_gmt":"2025-11-12T03:03:27","slug":"november-patch-tuesday-zero-day-windows-kernel-flaw-in-servers-controllers-and-pcs","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5755","title":{"rendered":"November Patch Tuesday: Zero day Windows kernel flaw in servers, controllers, and PCs"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A zero day elevation of privilege Windows kernel flaw in servers, controllers, and desktops is being actively exploited and needs to be patched immediately.<\/p>\n<p>That\u2019s the advice of <a href=\"https:\/\/www.tenable.com\/profile\/satnam-narang\" target=\"_blank\" rel=\"noopener\">Satnam Narang<\/a>, senior staff research engineer at Tenable, on one of the two biggest vulnerabilities that needs to be addressed from among the 63 holes identified by Microsoft in today\u2019s November Patch Tuesday releases.<\/p>\n<p>Separately, SAP today released four HotNews Notes and two HighPriority Notes among its 26 new and updated security patches. One patch deletes the SQL Anywhere Monitor because of hard-coded credentials.<\/p>\n<p>Also today, Adobe released eight updates, while Mozilla released three.<\/p>\n<h2 class=\"wp-block-heading\">Windows kernel flaw<\/h2>\n<p>The most urgent of the Microsoft holes to be addressed is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62215\" target=\"_blank\" rel=\"noopener\">CVE-2025-62215<\/a> (the Windows kernel vulnerability),\u201d Narang told <em>CSO<\/em> in an email. \u201cWhile there is a substantial prerequisite to exploit the bug, Microsoft confirmed active exploitation is underway. The consequences cannot be ignored, as elevation of privilege vulnerabilities are the keys to opening other doors within the organization. This is how attackers go from initial foothold to full-blown breach.\u201d<\/p>\n<p>And, <a href=\"https:\/\/www.action1.com\/team\/\" target=\"_blank\" rel=\"noopener\">Mike Walters<\/a>, president of Action1, points out, this vulnerability impacts servers and domain controllers as much as desktops.<\/p>\n<p><a href=\"https:\/\/www.ivanti.com\/blog\/authors\/chris-goettl\" target=\"_blank\" rel=\"noopener\">Chris Goettl<\/a>, vice president of product management at Ivanti, notes that this vulnerability affects all currently supported Windows OS editions plus the Windows 10 machines covered by the ESU (Extended Security Updates) program, \u201cwhich means running Windows 10 past the end-of life (EOL) is not a hypothetical risk.\u201d\u00a0<\/p>\n<p><a href=\"https:\/\/www.immersivelabs.com\/author\/ben-mccarthy\" target=\"_blank\" rel=\"noopener\">Ben McCarthy<\/a>, lead cyber security engineer at Immersive, explained how this hole can be exploited. An attacker with low-privilege local access can run a specially crafted application that repeatedly attempts to trigger a race condition. The goal is to get multiple threads to interact with a shared kernel resource in an unsynchronized way, confusing the kernel\u2019s memory management and causing it to free the same memory block twice. This successful \u201cdouble free\u201d corrupts the kernel heap, allowing the attacker to overwrite memory and hijack the system\u2019s execution flow.<\/p>\n<p>Microsoft says while the attack complexity to exploit this hole is high \u2014 successful exploitation requires an attacker to win a race condition \u2014 the privileges required are low. And the prize is great: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.<\/p>\n<p>Those in the Windows ESU program should note that, according to <a href=\"https:\/\/www.linkedin.com\/in\/nicholasacarroll\/\" target=\"_blank\" rel=\"noopener\">Nick Carroll<\/a>, cyber incident response manager at Nightwing, some users have been reporting issues enrolling in the Extended Security Update program. Microsoft has recently released an out-of-band update to address issues when users try to enroll in the Windows 10 Consumer Extended Security Update program, he said. Admins planning to participate in the program should make sure to update and install <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/november-11-2025-kb5071959-windows-10-version-22h2-os-build-19045-6466-out-of-band-565c78a7-5b5f-4cbd-8ca8-2a73a48f4e2b\" target=\"_blank\" rel=\"noopener\">KB5071959<\/a> to address the enrollment issues. After that is installed, users should be able to install other updates such as today\u2019s KB5068781, which is the latest update to Windows 10.<\/p>\n<h2 class=\"wp-block-heading\">Flaw in Visual Studio Copilot Extension<\/h2>\n<p>The second major vulnerability is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62222\" target=\"_blank\" rel=\"noopener\">CVE-2025-62222<\/a>, a remote code execution flaw in Microsoft Visual Studio Code Copilot Chat Extension.\u00a0<\/p>\n<p>While it is rated as less likely to be exploited, Narang said, it \u201cunderscores a growing interest in finding bugs in generative AI or agentic AI, which encompasses large language models, whether foundational models or open source models, and the AI-assisted code editing tools.\u201d<\/p>\n<p><a href=\"https:\/\/blog.talosintelligence.com\/microsoft-patch-tuesday-november-2025\/\" target=\"_blank\" rel=\"noopener\">Researchers at Cisco Systems said<\/a> exploitation is not trivial for this vulnerability, as it requires multiple steps: prompt injection, Copilot Agent interaction, and triggering a build. Cisco notes that Microsoft assessed that the attack complexity is \u201chigh\u201d, and that exploitation is \u201cless likely\u201d.\u00a0\u00a0<\/p>\n<p>CSOs should already be addressing emerging AI risks with governance and policy enforcement, added Narang. \u201cIf Shadow AI and unchecked sanctioned AI usage run rampant through their organization, CSOs must modify their strategy to govern this emerging, complex attack surface before it\u2019s too late.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Kerberos vulnerability<\/h2>\n<p>Among the fixes released is one for <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-60704\" target=\"_blank\" rel=\"noopener\">CVE-2025-60704<\/a>, a Kerboros delegation vulnerability in Active Directory dubbed CheckSum by researchers at Silverfort, who discovered it. If exploited, an attacker could impersonate an authenticated user, escalate privileges and stay hidden.<\/p>\n<p>Because Kerberos is a way to enable applications to authenticate securely on behalf of users, abuse of it can  be dangerous, Silverfort says in an explanation of this vulnerability. Using a man-in-the-middle technique, the flaw allows researchers to impersonate arbitrary users and ultimately gain control over the entire domain.<\/p>\n<p>\u201cAny organization using Active Directory with the Kerberos delegation capability turned on is impacted,\u201d says Silverfort. \u201cThis means thousands of companies around the world are affected by this vulnerability.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Microsoft Graphics Component flaw<\/h2>\n<p>Tyler Reguly, associate director of R&amp;D at Fortra, was drawn to <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-60724\" target=\"_blank\" rel=\"noopener\">CVE-2025-60724<\/a>, one of several vulnerabilities rated critical in severity. It\u2019s\u00a0a heap-based buffer overflow in Microsoft Graphics Component that could allow an unauthorized attacker to execute code over a network.<\/p>\n<p>He notes that Microsoft says, \u201cin the worst-case scenario, an attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile without user interaction.\u201d\u00a0 \u00a0<\/p>\n<p>\u201cIf I\u2019m a CISO, then CVE-2025-60724 has me worried this month,\u201d he told <em>CSO<\/em>. \u201cWe have a vulnerability that Microsoft and CVSS agree is critical and an attack vector that requires no user interaction and no privileges, just the ability to upload a file. We know nothing about the file type, the technologies that are impacted (other than GDI+ in the title), or the services impacted. Do I need to worry about my SharePoint infrastructure? What about third-party software \u2013 my wiki or my bug tracker? This is definitely one that feels a little spooky without a lot of extra details being provided.\u201d<\/p>\n<p>Cisco explains the vulnerability can be triggered by convincing a victim open a document that contains a specially crafted metafile.\u00a0\u00a0<\/p>\n<p>\u201cIn the worst-case scenario,\u201d its researchers write, \u201can attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile without user interaction. An attacker doesn\u2019t require any privileges on the systems hosting the web services. Successful exploitation of this vulnerability could cause RCE or information disclosure on web services that are parsing documents that contain a specially crafted metafile, without the involvement of a victim user.\u201d<\/p>\n<h2 class=\"wp-block-heading\">SAP patches<\/h2>\n<p>The patches released by SAP today include some Notes that are updates to previously related fixes. That includes two HotNews patches. But there are new two patches, rated high priority by Onapsis, dealing with SAP Commerce Cloud (with a CVSS score of 7.5) and SAP CommonCryptoLib (also with a score of 7.5).<\/p>\n<p>One of the notes, <a href=\"https:\/\/me.sap.com\/notes\/3666261\" target=\"_blank\" rel=\"noopener\">#3666261<\/a>, has a CVSS score of 10. It deals with an insecure key and secret management vulnerability in SQL Anywhere Monitor with hard-coded credentials. SQL Anywhere Monitor is a browser-based administration tool that gives admins information about the health and availability of\u00a0SQL Anywhere\u00a0databases, MobiLink servers, and MobiLink server farms. It can also provide information about the availability of web servers, proxy servers, and host computers;<\/p>\n<p>The patch removes SQL Anywhere Monitor completely, <a href=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-november-2025\/\" target=\"_blank\" rel=\"noopener\">say researchers at Onapsis<\/a>. As a temporary workaround, SAP recommends that admins stop using this tool and delete any instances of SQL Anywhere Monitor database.<\/p>\n<p>Another note to pay attention to,\u00a0<a href=\"https:\/\/me.sap.com\/notes\/3668705\" target=\"_blank\" rel=\"noopener\">#3668705<\/a> (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-42887\" target=\"_blank\" rel=\"noopener\">CVE-2025-42887<\/a>) patches a code injection vulnerability in SAP Solution Manager. Due to missing input sanitization in a remote-enabled function module, authenticated attackers are able to inject malicious code into the system. Rated with a CVSS score of 9.9, this vulnerability is patched by adding an input check that rejects most of the non-alphanumeric characters.<\/p>\n<p>\u201cCVE-2025-42887 is particularly dangerous because it allows an attacker to inject code from a low-privileged user, which leads to a full SAP compromise and all data contained in the SAP system,\u201d notes \u00a0Joris van de Vis, director of security research at SecurityBridge.\u00a0<\/p>\n<p>Onapsis CTO Juan Pablo Perez-Etchegoyen also says admins need to deal quickly with Note #<a href=\"https:\/\/me.sap.com\/notes\/3633049\" target=\"_blank\" rel=\"noopener\">3633049<\/a>. \u201cDespite this being a CVSS 7.5,\u201d he said in an email to <em>CSO<\/em>, \u201cit is a memory corruption potentially exploitable remotely pre-authentication, and these types of vulnerability tend to be very critical because of their nature and potential for denial of service and system compromise.\u201d\u00a0<\/p>\n<p>However, with many of these vulnerabilities, patching alone is not enough: architecture, exposure, segmentation, and monitoring still matter, advises Mike Walters of Action1. \u201cCSOs need to involve not just patching teams, but also service owners (print, scan, document sharing, remote access), network\/security teams (for segmentation and exposure control), and logging\/monitoring teams (for post-patch verification),\u201d he said. \u00a0<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A zero day elevation of privilege Windows kernel flaw in servers, controllers, and desktops is being actively exploited and needs to be patched immediately. That\u2019s the advice of Satnam Narang, senior staff research engineer at Tenable, on one of the two biggest vulnerabilities that needs to be addressed from among the 63 holes identified by [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5755","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5755"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5755"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5755\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5756"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}