Microsoft Announces Fix for 80 Security Vulnerabilities, Including Critical SMB Privilege Escalation and Azure CVSS 10.0 Issues

On September 10, 2025, Microsoft released patches for 80 security flaws across its software. This update includes one vulnerability that had already been disclosed publicly. Among these, eight are classified as Critical, while 72 are deemed Important. Fortunately, none were exploited in the wild as zero-day vulnerabilities. Similar to the previous month, 38 flaws are linked to privilege escalation, followed by 22 related to remote code execution, 14 concerning information disclosure, and 3 classified as denial-of-service. “For the third time this year, Microsoft has addressed more privilege escalation vulnerabilities than remote code execution issues,” noted Satnam Narang, Senior Staff Research Engineer at Tenable. “Almost half (47.5%) of the vulnerabilities this month are related to privilege escalation.” This patch release also includes updates to 12 vulnerabilities in Microsoft’s Chromium-based Edge browser since August 2025’s Patch Tuesday.

Microsoft Addresses 80 Security Flaws, Including Critical SMB Privilege Escalation and Azure Vulnerabilities

On September 10, 2025, Microsoft released patches for 80 identified security vulnerabilities in its software ecosystem. Among these flaws, eight have been classified as Critical, while the remaining 72 are deemed Important in terms of severity. Notably, one of these vulnerabilities had already been disclosed publicly prior to the release of the patches. Importantly, none of the flaws had been exploited in the wild as zero-day vulnerabilities at the time of this announcement.

The latest patch cycle continues a concerning trend, with 38 of the identified vulnerabilities linked to privilege escalation, while 22 are associated with remote code execution. Information disclosure accounts for 14 vulnerabilities, and three pertain to denial-of-service incidents. According to Satnam Narang, a senior staff research engineer at Tenable, this marks the third occasion within the year when Microsoft has patched more privilege escalation vulnerabilities than those related to remote code execution. In fact, nearly half of the vulnerabilities disclosed in this round—approximately 47.5%—were related to privilege escalation, underscoring a persistent area of risk for organizations.

Additionally, it’s important to note that these recent patches supplement the 12 vulnerabilities already addressed in Microsoft’s Chromium-based Edge browser since the previous month’s Patch Tuesday update. This points to an ongoing effort by Microsoft to bolster the security of its software against emerging threats.

Business owners must take heed of these vulnerabilities, especially those related to privilege escalation, as they directly compromise users’ ability to maintain control over systems and data. Exploits leveraging such weaknesses can enable adversaries to gain unauthorized access and escalate their privileges within a compromised environment. Furthermore, the detected vulnerabilities may have utilized tactics from the MITRE ATT&CK framework, particularly techniques pertaining to initial access and privilege escalation. Such techniques could allow adversaries to infiltrate a system unnoticed and elevate their access rights to execute malicious operations.

Given the prevalence of these vulnerabilities, organizations are urged to apply the latest patches promptly and to routinely assess their security postures. Implementing preventive measures can significantly mitigate the risks stemming from these identified weaknesses.

In conclusion, while Microsoft continues to strengthen its software ecosystem, the discharge of 80 vulnerabilities highlights ongoing challenges in cybersecurity. For business owners, staying informed and practicing vigilance will be crucial in navigating an increasingly complex threat landscape.

Source link