{"id":232563,"date":"2025-12-14T15:06:12","date_gmt":"2025-12-14T15:06:12","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/232563\/"},"modified":"2025-12-14T15:06:12","modified_gmt":"2025-12-14T15:06:12","slug":"41-microsoft-zero-days-now-millions-of-users-face-update-choice","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/232563\/","title":{"rendered":"41 Microsoft Zero-Days \u2014 Now Millions Of Users Face Update Choice"},"content":{"rendered":"<p><img decoding=\"async\" class=\" top-image\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/1765724772_863_0x0.jpg\" alt=\"Microsoft logo on smartphone, with logo magnified in background. \" data-height=\"1325\" data-width=\"1988\" fetchpriority=\"high\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Microsoft confirmed 41 zero-day vulnerabilities during 2025<\/p>\n<p>Getty Images<\/p>\n<p>It has only been a matter of days since the U.S. Cybersecurity and Infrastructure Security Agency confirmed that Windows users were under attack from two zero-day exploits and urged federal users to update immediately. Here\u2019s the thing, though, as a new report revealed a total of 41 Microsoft zero-day vulnerabilities across 2025 that had been addressed in Patch Tuesday rollouts, others remain unpatched at the time of writing. Yes, you read that right. So, millions of Microsoft users have a security update choice to make: Is relying upon Patch Tuesday enough?<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/13\/microsoft-warning---act-rapidly-and-change-passwords-as-attacks-strike\/\" target=\"_blank\" aria-label=\"Microsoft Worm Attack Warning \u2014 Act Rapidly And Change Passwords Now\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/13\/microsoft-warning---act-rapidly-and-change-passwords-as-attacks-strike\/\" rel=\"nofollow noopener\">ForbesMicrosoft Worm Attack Warning \u2014 Act Rapidly And Change Passwords NowBy Davey Winder<\/a>Microsoft Patched 41 Zero-Days \u2014 But It\u2019s Not Good Enough<\/p>\n<p>A new <a class=\"color-link\" href=\"https:\/\/www.tenable.com\/blog\/microsoft-patch-tuesday-2025-year-in-review\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.tenable.com\/blog\/microsoft-patch-tuesday-2025-year-in-review\" aria-label=\"Tenable report\">Tenable report<\/a> has confirmed that Microsoft detailed and addressed more than 1,100 vulnerabilities during 2025 Patch Tuesday rollouts. That number included a total of 41 zero-day vulnerabilities. Of these, 24 were known to have been exploited in the wild at the time of the updates. Microsoft <a class=\"color-link\" href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365-life-hacks\/privacy-and-safety\/zero-day-vulnerability-exploit\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.microsoft.com\/en-us\/microsoft-365-life-hacks\/privacy-and-safety\/zero-day-vulnerability-exploit\" aria-label=\"distinguishes\">distinguishes<\/a> between vulnerabilities that have been disclosed before a fix is available and those that have already been exploited, using the terms zero-day vulnerability and zero-day exploit.<\/p>\n<p>However you define them, zero-days are never to be ignored. The stakes are, frankly, much too high. That goes for consumers and enterprises alike, as data of all denominations is valuable to cybercriminal hackers. When America\u2019s Cyber Defense Agency <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/10\/microsoft-and-cisa-issue-critical-new-alert-windows-attacks-confirmed\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/10\/microsoft-and-cisa-issue-critical-new-alert-windows-attacks-confirmed\/\" target=\"_self\" aria-label=\"confirmed\" rel=\"nofollow noopener\">confirmed<\/a> that not only was the CVE-2025-62221 Windows cloud files mini-filter driver escalation-of-privilege vulnerability being actively exploited, but also CVE-2025-6218, a WinRAR issue that only impacts Windows users and was patched in July, it served to highlight both the seriousness and problems of patching zero-days. The December Patch Tuesday rollout fixed the first, but Windows users were not protected from the second unless they updated the application itself.<\/p>\n<p>OK, so you might say that\u2019s a bit of a stretch, Microsoft cannot be expected to address security issues in third-party applications. But what about its own zero-days that are left unpatched by official updates for far too long? Security researchers have just revealed that, while analyzing an already patched Windows Remote Access Connection Manager privilege escalation vulnerability, CVE-2025-59230, <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/13\/microsoft-warning---act-rapidly-and-change-passwords-as-attacks-strike\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/13\/microsoft-warning---act-rapidly-and-change-passwords-as-attacks-strike\/\" target=\"_self\" aria-label=\"a new zero-day emerged\" rel=\"nofollow noopener\">a new zero-day emerged<\/a>. The original vulnerability was patched by Microsoft in October, while a company spokesperson told me that the latest one would be addressed by \u201ca future fix.\u201d<\/p>\n<p>And that, dear reader, is where your decision comes to the fore.  Do you <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/01\/new-warning-as-microsoft-windows-attacks-confirmed---no-fix-available\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/01\/new-warning-as-microsoft-windows-attacks-confirmed---no-fix-available\/\" target=\"_self\" aria-label=\"wait for Microsoft\" rel=\"nofollow noopener\">wait for Microsoft<\/a> to release a zero-day patch, whether that is by way of an out-of-band update, not a scheduled Patch Tuesday release, in other words, or do you make the choice to proactively protect your networks, devices and data by using an alternative patching service?<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-2\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/04\/microsoft-silently-activates-critical-windows-security-update\/\" target=\"_blank\" aria-label=\"Microsoft Silently Activates Critical Windows Security Update\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/12\/04\/microsoft-silently-activates-critical-windows-security-update\/\" rel=\"nofollow noopener\">ForbesMicrosoft Silently Activates Critical Windows Security UpdateBy Davey Winder<\/a>Microsoft Users Must Now Decide If Patch Tuesday Is Protection Enough<\/p>\n<p>The Windows RasMan zero-day I just mentioned is a great example to use when it comes to the patching choice facing Microsoft users. Are you happy to leave it in Microsoft\u2019s hands and wait until it eventually drops a patch, or should you get proactive and patch it now? The latter is certainly possible, and for many otherwise exposed users it could be considered a must. You can read the report on that zero-day in <a class=\"color-link\" href=\"https:\/\/The Windows RasMan zero-day I just mentioned is a great example to use when it comes to the patching choice facing Microsoft users. Are you happy to leave it in Microsoft\u2019s hands and wait until it eventually drops a patch, or should you get proactive and patch it now? The latter is certainly possible, and for many otherwise exposed users it could be considered a must. You can read the report on that zero-day in an analysis https:\/\/blog.0patch.com\/2025\/12\/free-micropatches-for-windows-remote.html published by the co-founder of the 0patch service, Mitja Kolsek. And it\u2019s this service that provides the alternative, or rather an accompanying, solution to the zero-day patching problem.   0patch provides a commercial hot-patching platform, but what I\u2019m interested in, and you should be as well, is the free offering that comes into play when there\u2019s an unpatched Windows zero-vulnerability out there. Hot patches are no-reboot security fixes that install in the background, deployed within the in-memory code of already running processes. 0patch is a combination of hot-patching and micro-patching, and makes these fixes available free of charge to anyone until Microsoft provides an official fix. \" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/The Windows RasMan zero-day I just mentioned is a great example to use when it comes to the patching choice facing Microsoft users. Are you happy to leave it in Microsoft\u2019s hands and wait until it eventually drops a patch, or should you get proactive and patch it now? The latter is certainly possible, and for many otherwise exposed users it could be considered a must. You can read the report on that zero-day in an analysis https:\/\/blog.0patch.com\/2025\/12\/free-micropatches-for-windows-remote.html published by the co-founder of the 0patch service, Mitja Kolsek. And it\u2019s this service that provides the alternative, or rather an accompanying, solution to the zero-day patching problem.   0patch provides a commercial hot-patching platform, but what I\u2019m interested in, and you should be as well, is the free offering that comes into play when there\u2019s an unpatched Windows zero-vulnerability out there. Hot patches are no-reboot security fixes that install in the background, deployed within the in-memory code of already running processes. 0patch is a combination of hot-patching and micro-patching, and makes these fixes available free of charge to anyone until Microsoft provides an official fix. \" aria-label=\"an analysis\">an analysis<\/a> published by the co-founder of the 0patch service, Mitja Kolsek. And it\u2019s this service that provides the alternative, or rather an accompanying, solution to the zero-day patching problem.<\/p>\n<p>0patch provides a commercial <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/30\/microsoft-confirms-150-windows-security-update-fee-starts-july-1\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/30\/microsoft-confirms-150-windows-security-update-fee-starts-july-1\/\" target=\"_self\" aria-label=\"hot-patching\" rel=\"nofollow noopener\">hot-patching<\/a> platform, but what I\u2019m interested in, and you should be as well, is the free offering that comes into play when there\u2019s an unpatched Windows zero-vulnerability out there. Hot patches are no-reboot security fixes that install in the background, deployed within the in-memory code of already running processes. 0patch is a combination of hot-patching and micro-patching, and makes these fixes available free of charge to anyone until Microsoft provides an official fix. <\/p>\n","protected":false},"excerpt":{"rendered":"Microsoft confirmed 41 zero-day vulnerabilities during 2025 Getty Images It has only been a matter of days since&hellip;\n","protected":false},"author":2,"featured_media":232564,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[123987,123984,18,19,17,123982,123986,123981,82,69418,6950,123983,123985,33828],"class_list":{"0":"post-232563","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-0patch","9":"tag-41-microsoft-zero-days","10":"tag-eire","11":"tag-ie","12":"tag-ireland","13":"tag-microsoft-security-update","14":"tag-microsoft-security-update-choice","15":"tag-patch-tuesday","16":"tag-technology","17":"tag-tenable","18":"tag-windows","19":"tag-windows-security-update","20":"tag-zero-day-vulnerability","21":"tag-zero-day"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/115718545980208312","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/232563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=232563"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/232563\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/232564"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=232563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=232563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=232563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}