On November 11, 2025, Microsoft released its November 2025 security update, addressing 63 newly disclosed vulnerabilities. Arctic Wolf has highlighted two vulnerabilities affecting Microsoft Windows in this security bulletin due to their potential risk.
Vulnerabilities
| Vulnerability | CVSS | Description | Exploited? |
| CVE-2025-60724 | 9.8 | GDI+ Remote Code Execution (RCE) Vulnerability – Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized threat actor to execute code over a network by convincing a user to download and open a document containing a specially crafted metafile. It can also be exploited against web services by uploading such documents, enabling RCE or information disclosure without any privileges or user interaction. | No |
| CVE-2025-62215 | 7.0 | Windows Kernel Elevation of Privilege Vulnerability – A race condition in the Windows Kernel’s handling of a shared resource allows an authorized threat actor (a local user) to escalate privileges to SYSTEM by exploiting a timing window. Successful exploitation depends on winning that race condition.
|
Yes |
Recommendation
Upgrade to Latest Fixed Versions
Arctic Wolf strongly recommends that customers upgrade to the latest fixed versions.
| Affected Product | Vulnerability | Update Article |
| Windows Server 2025 | CVE-2025-62215, CVE-2025-60724 | 5068861, 5068966 |
| Windows Server 2022, 23H2 Edition | CVE-2025-62215, CVE-2025-60724 | 5068779 |
| Windows Server 2022 | CVE-2025-62215, CVE-2025-60724 | 5068787, 5068840 |
| Windows Server 2019 | CVE-2025-62215, CVE-2025-60724 | 5068791 |
| Windows Server 2016 | CVE-2025-62215, CVE-2025-60724 | 5068864 |
| Windows Server 2012 R2 | CVE-2025-60724 | 5068905 |
| Windows Server 2012 | CVE-2025-60724 | 5068907 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | CVE-2025-60724 | 5068904, 5068908 |
| Windows Server 2008 for 32-bit, and x64-based Systems Service Pack 2 | CVE-2025-60724 | 5068906, 5068909 |
| Windows 11 Version 25H2 for x64-based, and ARM64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068861, 5068966 |
| Windows 11 Version 24H2 for x64-based, and ARM64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068861, 5068966 |
| Windows 11 Version 23H2 for x64-based, and ARM64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068865 |
| Windows 10 Version 22H2 for 32-bit, x64-based, and ARM64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068781 |
| Windows 10 Version 21H2 for 32-bit, x64-based, and ARM64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068781 |
| Windows 10 Version 1809 for 32-bit, and x64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068791 |
| Windows 10 Version 1607 for 32-bit, and x64-based Systems | CVE-2025-62215, CVE-2025-60724 | 5068864 |
| Microsoft Office LTSC for Mac 2024, and 2021 | CVE-2025-60724 | Release Notes |
| Microsoft Office for Android | CVE-2025-60724 | Release Notes |
Please follow your organization’s patching and testing guidelines to minimize potential operational impact.
References



