Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

Microsoft Patch Tuesday: November 2025

Microsoft released its November 2025 security update, addressing 63 newly disclosed vulnerabilities. Arctic Wolf has highlighted two vulnerabilities affecting Microsoft Windows in this security bulletin due to their potential risk. 
Arctic Wolf Security Bulletin
6 min read

On November 11, 2025, Microsoft released its November 2025 security update, addressing 63 newly disclosed vulnerabilities. Arctic Wolf has highlighted two vulnerabilities affecting Microsoft Windows in this security bulletin due to their potential risk. 

Vulnerabilities 

Vulnerability  CVSS  Description  Exploited? 
CVE-2025-60724  9.8  GDI+ Remote Code Execution (RCE) Vulnerability – Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized threat actor to execute code over a network by convincing a user to download and open a document containing a specially crafted metafile. It can also be exploited against web services by uploading such documents, enabling RCE or information disclosure without any privileges or user interaction.  No 
CVE-2025-62215  7.0  Windows Kernel Elevation of Privilege Vulnerability – A race condition in the Windows Kernel’s handling of a shared resource allows an authorized threat actor (a local user) to escalate privileges to SYSTEM by exploiting a timing window. Successful exploitation depends on winning that race condition. 

  • Details on how a threat actor exploited this vulnerability in the wild have not been disclosed. 
Yes 

Recommendation 

Upgrade to Latest Fixed Versions

Arctic Wolf strongly recommends that customers upgrade to the latest fixed versions. 

Affected Product  Vulnerability  Update Article 
Windows Server 2025  CVE-2025-62215, CVE-2025-60724  5068861, 5068966 
Windows Server 2022, 23H2 Edition   CVE-2025-62215, CVE-2025-60724  5068779 
Windows Server 2022  CVE-2025-62215, CVE-2025-60724  5068787, 5068840 
Windows Server 2019  CVE-2025-62215, CVE-2025-60724  5068791 
Windows Server 2016  CVE-2025-62215, CVE-2025-60724  5068864 
Windows Server 2012 R2  CVE-2025-60724  5068905 
Windows Server 2012  CVE-2025-60724  5068907 
Windows Server 2008 R2 for x64-based Systems Service Pack 1  CVE-2025-60724  5068904, 5068908 
Windows Server 2008 for 32-bit, and x64-based Systems Service Pack 2  CVE-2025-60724  5068906, 5068909 
Windows 11 Version 25H2 for x64-based, and ARM64-based Systems  CVE-2025-62215, CVE-2025-60724  5068861, 5068966 
Windows 11 Version 24H2 for x64-based, and ARM64-based Systems  CVE-2025-62215, CVE-2025-60724  5068861, 5068966 
Windows 11 Version 23H2 for x64-based, and ARM64-based Systems  CVE-2025-62215, CVE-2025-60724  5068865 
Windows 10 Version 22H2 for 32-bit, x64-based, and ARM64-based Systems  CVE-2025-62215, CVE-2025-60724  5068781 
Windows 10 Version 21H2 for 32-bit, x64-based, and ARM64-based Systems  CVE-2025-62215, CVE-2025-60724  5068781 
Windows 10 Version 1809 for 32-bit, and x64-based Systems  CVE-2025-62215, CVE-2025-60724  5068791 
Windows 10 Version 1607 for 32-bit, and x64-based Systems  CVE-2025-62215, CVE-2025-60724  5068864 
Microsoft Office LTSC for Mac 2024, and 2021  CVE-2025-60724  Release Notes 
Microsoft Office for Android  CVE-2025-60724  Release Notes 

 

Please follow your organization’s patching and testing guidelines to minimize potential operational impact. 

References 

 

Share this post: