This year-end update strengthens Windows 11 security and delivers key performance and usability improvements.
Key Takeaways:
Microsoft has released the December 2025 Patch Tuesday updates for Windows 11 versions 25H2 and 24H2. This month, the company rolled out 56 new patches to address vulnerabilities in Windows, Office, Exchange Server, Azure, PowerShell, Windows Defender, and other components.
On the quality and experience updates front, Microsoft has introduced a couple of improvements for Windows 11 version 25H2 and 24H2. The company has also announced that it will skip releasing an optional preview update later this month because activity typically slows down during the holiday season.
As pointed out by Zero Day Initiative, Microsoft has fixed a total of 56 security flaws, three of which are deemed Critical. The rest of the vulnerabilities are rated as Important in terms of severity. Here’s a list of the most notable flaws Microsoft addressed in December:
You can find the full list of CVEs addressed in the December 2025 Patch Tuesday Updates below:
| Product | Impact | Max Severity | Article | Download | Details |
| Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5071547 | Security Update | CVE-2025-62221 |
| Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5071413 | Security Hotpatch Update | CVE-2025-62221 |
| Windows 11 Version 25H2 for x64-based Systems | Elevation of Privilege | Important | 5072033 | Security Update | CVE-2025-62221 |
| Windows 11 Version 25H2 for x64-based Systems | Elevation of Privilege | Important | 5072014 | Security Hotpatch Update | CVE-2025-62221 |
| Windows 11 Version 25H2 for ARM64-based Systems | Elevation of Privilege | Important | 5072033 | Security Update | CVE-2025-62221 |
| Windows 11 Version 25H2 for ARM64-based Systems | Elevation of Privilege | Important | 5072014 | Security Hotpatch Update | CVE-2025-62221 |
| Windows Server 2025 (Server Core installation) | Elevation of Privilege | Important | 5072033 | Security Update | CVE-2025-62221 |
| Windows Server 2025 (Server Core installation) | Elevation of Privilege | Important | 5072014 | Security Hotpatch Update | CVE-2025-62221 |
| Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5071546 | Security Update | CVE-2025-62221 |
| Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5071546 | Security Update | CVE-2025-62221 |
| Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5071546 | Security Update | CVE-2025-62221 |
| Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5071546 | Security Update | CVE-2025-62221 |
| Windows 10 Version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5071546 | Security Update | CVE-2025-62221 |
| Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5071546 | Security Update | CVE-2025-62221 |
| Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5071544 | Security Update | CVE-2025-62221 |
| Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5071503 | Monthly Rollup | CVE-2025-54100 |
| Microsoft SharePoint Server Subscription Edition | Spoofing | Important | 5002815 | Security Update | CVE-2025-64672 |
| GitHub Copilot Plugin for JetBrains IDEs | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-64671 |
| Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5071543 | Security Update | CVE-2025-64661 |
| Windows Server 2016 | Elevation of Privilege | Important | 5071543 | Security Update | CVE-2025-64661 |
| Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5071543 | Security Update | CVE-2025-64661 |
| Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5071543 | Security Update | CVE-2025-64661 |
| Windows Server 2025 | Elevation of Privilege | Important | 5072033 | Security Update | CVE-2025-64661 |
| Windows Server 2025 | Elevation of Privilege | Important | 5072014 | Security Hotpatch Update | CVE-2025-64661 |
| Windows 11 Version 24H2 for x64-based Systems | Elevation of Privilege | Important | 5072033 | Security Update | CVE-2025-64661 |
| Windows 11 Version 24H2 for x64-based Systems | Elevation of Privilege | Important | 5072014 | Security Hotpatch Update | CVE-2025-64661 |
| Windows 11 Version 24H2 for ARM64-based Systems | Elevation of Privilege | Important | 5072033 | Security Update | CVE-2025-64661 |
| Windows 11 Version 24H2 for ARM64-based Systems | Elevation of Privilege | Important | 5072014 | Security Hotpatch Update | CVE-2025-64661 |
| Windows Server 2022, 23H2 Edition (Server Core installation) | Elevation of Privilege | Important | 5071542 | Security Update | CVE-2025-64661 |
| Windows 11 Version 23H2 for x64-based Systems | Elevation of Privilege | Important | 5071417 | Security Update | CVE-2025-64661 |
| Windows 11 Version 23H2 for ARM64-based Systems | Elevation of Privilege | Important | 5071417 | Security Update | CVE-2025-64661 |
| Microsoft Word 2016 (32-bit edition) | Remote Code Execution | Important | 5002806 | Security Update | CVE-2025-62559 |
| Microsoft Office LTSC for Mac 2024 | Remote Code Execution | Important | CVE-2025-62559 | ||
| Microsoft Office LTSC 2024 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62559 |
| Microsoft Office LTSC 2024 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62559 |
| Microsoft Office LTSC 2021 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62559 |
| Microsoft Office LTSC 2021 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62559 |
| Microsoft Office LTSC for Mac 2021 | Remote Code Execution | Important | CVE-2025-62559 | ||
| Microsoft Office 2019 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62552 |
| Microsoft Office 2019 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62552 |
| Azure Monitor Agent | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-62550 |
| Windows Server 2012 R2 | Elevation of Privilege | Important | 5071503 | Monthly Rollup | CVE-2025-62474 |
| Windows Server 2012 (Server Core installation) | Elevation of Privilege | Important | 5071505 | Monthly Rollup | CVE-2025-62474 |
| Windows Server 2012 | Elevation of Privilege | Important | 5071505 | Monthly Rollup | CVE-2025-62474 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5071501 | Monthly Rollup | CVE-2025-62474 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5071506 | Security Only | CVE-2025-62474 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5071501 | Monthly Rollup | CVE-2025-62474 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5071506 | Security Only | CVE-2025-62474 |
| Windows Server 2022 | Elevation of Privilege | Important | 5071547 | Security Update | CVE-2025-62464 |
| Windows Server 2022 | Elevation of Privilege | Important | 5071413 | Security Hotpatch Update | CVE-2025-62464 |
| Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5071544 | Security Update | CVE-2025-62464 |
| Windows Server 2019 | Elevation of Privilege | Important | 5071544 | Security Update | CVE-2025-62464 |
| Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5071544 | Security Update | CVE-2025-62464 |
| Microsoft Exchange Server Subscription Edition RTM | Spoofing | Important | 5071876 | Security Update | CVE-2025-64667 |
| Office Online Server | Remote Code Execution | Important | 5002817 | Security Update | CVE-2025-62564 |
| Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002820 | Security Update | CVE-2025-62563 |
| Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002818 | Security Update | CVE-2025-62563 |
| Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002820 | Security Update | CVE-2025-62563 |
| Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002818 | Security Update | CVE-2025-62563 |
| Microsoft 365 Apps for Enterprise for 64-bit Systems | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62563 |
| Microsoft 365 Apps for Enterprise for 32-bit Systems | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-62563 |
| Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5071504 | Monthly Rollup | CVE-2025-54100 |
| Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5071507 | Security Only | CVE-2025-54100 |
| Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5071504 | Monthly Rollup | CVE-2025-54100 |
| Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5071507 | Security Only | CVE-2025-54100 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5071504 | Monthly Rollup | CVE-2025-54100 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5071507 | Security Only | CVE-2025-54100 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5071504 | Monthly Rollup | CVE-2025-54100 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5071507 | Security Only | CVE-2025-54100 |
| Windows Server 2025 | Remote Code Execution | Important | 5074204 | Security Update | CVE-2025-54100 |
| Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Important | 5074204 | Security Only | CVE-2025-54100 |
| Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Important | 5074204 | Security Only | CVE-2025-54100 |
| Windows 11 Version 25H2 for x64-based Systems | Remote Code Execution | Important | 5074204 | Security Only | CVE-2025-54100 |
| Windows 11 Version 25H2 for ARM64-based Systems | Remote Code Execution | Important | 5074204 | Security Update | CVE-2025-54100 |
| Windows Server 2025 (Server Core installation) | Remote Code Execution | Important | 5074204 | Security Update | CVE-2025-54100 |
| Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5074353 | Security Only | CVE-2025-54100 |
| Windows Server 2022 | Remote Code Execution | Important | 5074353 | Security Only | CVE-2025-54100 |
| Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5066836 | Security Update | CVE-2025-64680 |
| Windows Server 2016 | Elevation of Privilege | Important | 5066836 | Security Update | CVE-2025-64680 |
| Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5066836 | Security Update | CVE-2025-64680 |
| Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5066836 | Security Update | CVE-2025-64680 |
| Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5066837 | Security Update | CVE-2025-64680 |
| Windows 10 for 32-bit Systems | Elevation of Privilege | Important | 5066837 | Security Update | CVE-2025-64680 |
| Windows Server 2025 | Elevation of Privilege | Important | 5066835 | Security Update | CVE-2025-64680 |
| Windows 11 Version 24H2 for x64-based Systems | Elevation of Privilege | Important | 5066835 | Security Update | CVE-2025-64680 |
| Windows 11 Version 24H2 for ARM64-based Systems | Elevation of Privilege | Important | 5066835 | Security Update | CVE-2025-64680 |
| Windows Server 2022, 23H2 Edition (Server Core installation) | Elevation of Privilege | Important | 5066780 | Security Update | CVE-2025-64680 |
| Windows 11 Version 23H2 for x64-based Systems | Elevation of Privilege | Important | 5066793 | Security Update | CVE-2025-64680 |
| Windows 11 Version 23H2 for ARM64-based Systems | Elevation of Privilege | Important | 5066793 | Security Update | CVE-2025-64680 |
| Windows 11 Version 25H2 for x64-based Systems | Elevation of Privilege | Important | 5066835 | Security Update | CVE-2025-64680 |
| Windows 11 Version 25H2 for ARM64-based Systems | Elevation of Privilege | Important | 5066835 | Security Update | CVE-2025-64680 |
| Windows Server 2025 (Server Core installation) | Elevation of Privilege | Important | 5066835 | Security Update | CVE-2025-64680 |
| Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5066791 | Security Update | CVE-2025-64680 |
| Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5066791 | Security Update | CVE-2025-64680 |
| Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5066791 | Security Update | CVE-2025-64680 |
| Windows 11 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5066793 | Security Update | CVE-2025-64680 |
| Windows 11 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5066793 | Security Update | CVE-2025-64680 |
| Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5066791 | Security Update | CVE-2025-64680 |
| Windows 10 Version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5066791 | Security Update | CVE-2025-64680 |
| Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5066791 | Security Update | CVE-2025-64680 |
| Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5066782 | Security Update | CVE-2025-64680 |
| Windows Server 2022 | Elevation of Privilege | Important | 5066782 | Security Update | CVE-2025-64680 |
| Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5066586 | Security Update | CVE-2025-64680 |
| Windows Server 2019 | Elevation of Privilege | Important | 5066586 | Security Update | CVE-2025-64680 |
| Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5066586 | Security Update | CVE-2025-64680 |
| Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5066586 | Security Update | CVE-2025-64680 |
| Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5068905 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2012 R2 | Remote Code Execution | Important | 5068905 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2012 (Server Core installation) | Remote Code Execution | Important | 5068907 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2012 | Remote Code Execution | Important | 5068907 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 5068904 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 5068908 | Security Only | CVE-2025-64678 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 5068904 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 5068908 | Security Only | CVE-2025-64678 |
| Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5068906 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5068909 | Security Only | CVE-2025-64678 |
| Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5068906 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5068909 | Security Only | CVE-2025-64678 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5068906 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5068909 | Security Only | CVE-2025-64678 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5068906 | Monthly Rollup | CVE-2025-64678 |
| Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5068909 | Security Only | CVE-2025-64678 |
| Windows Server 2016 (Server Core installation) | Remote Code Execution | Important | 5068864 | Security Update | CVE-2025-64678 |
| Windows Server 2016 | Remote Code Execution | Important | 5068864 | Security Update | CVE-2025-64678 |
| Windows 10 Version 1607 for x64-based Systems | Remote Code Execution | Important | 5068864 | Security Update | CVE-2025-64678 |
| Windows 10 Version 1607 for 32-bit Systems | Remote Code Execution | Important | 5068864 | Security Update | CVE-2025-64678 |
| Windows Server 2025 | Remote Code Execution | Important | 5068861 | Security Update | CVE-2025-64678 |
| Windows Server 2025 | Remote Code Execution | Important | 5068966 | Security Hotpatch Update | CVE-2025-64678 |
| Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Important | 5068861 | Security Update | CVE-2025-64678 |
| Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Important | 5068966 | Security Hotpatch Update | CVE-2025-64678 |
| Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Important | 5068861 | Security Update | CVE-2025-64678 |
| Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Important | 5068966 | Security Hotpatch Update | CVE-2025-64678 |
| Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Important | 5068779 | Security Update | CVE-2025-64678 |
| Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Important | 5068865 | Security Update | CVE-2025-64678 |
| Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Important | 5068865 | Security Update | CVE-2025-64678 |
| Windows 11 Version 25H2 for x64-based Systems | Remote Code Execution | Important | 5068861 | Security Update | CVE-2025-64678 |
| Windows 11 Version 25H2 for x64-based Systems | Remote Code Execution | Important | 5068966 | Security Hotpatch Update | CVE-2025-64678 |
| Windows 11 Version 25H2 for ARM64-based Systems | Remote Code Execution | Important | 5068861 | Security Update | CVE-2025-64678 |
| Windows 11 Version 25H2 for ARM64-based Systems | Remote Code Execution | Important | 5068966 | Security Hotpatch Update | CVE-2025-64678 |
| Windows Server 2025 (Server Core installation) | Remote Code Execution | Important | 5068861 | Security Update | CVE-2025-64678 |
| Windows Server 2025 (Server Core installation) | Remote Code Execution | Important | 5068966 | Security Hotpatch Update | CVE-2025-64678 |
| Windows 10 Version 22H2 for 32-bit Systems | Remote Code Execution | Important | 5068781 | Security Update | CVE-2025-64678 |
| Windows 10 Version 22H2 for ARM64-based Systems | Remote Code Execution | Important | 5068781 | Security Update | CVE-2025-64678 |
| Windows 10 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 5068781 | Security Update | CVE-2025-64678 |
| Windows 10 Version 21H2 for x64-based Systems | Remote Code Execution | Important | 5068781 | Security Update | CVE-2025-64678 |
| Windows 10 Version 21H2 for ARM64-based Systems | Remote Code Execution | Important | 5068781 | Security Update | CVE-2025-64678 |
| Windows 10 Version 21H2 for 32-bit Systems | Remote Code Execution | Important | 5068781 | Security Update | CVE-2025-64678 |
| Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5068787 | Security Update | CVE-2025-64678 |
| Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5068840 | Security Hotpatch Update | CVE-2025-64678 |
| Windows Server 2022 | Remote Code Execution | Important | 5068787 | Security Update | CVE-2025-64678 |
| Windows Server 2022 | Remote Code Execution | Important | 5068840 | Security Hotpatch Update | CVE-2025-64678 |
| Windows Server 2019 (Server Core installation) | Remote Code Execution | Important | 5068791 | Security Update | CVE-2025-64678 |
| Windows Server 2019 | Remote Code Execution | Important | 5068791 | Security Update | CVE-2025-64678 |
| Windows 10 Version 1809 for x64-based Systems | Remote Code Execution | Important | 5068791 | Security Update | CVE-2025-64678 |
| Windows 10 Version 1809 for 32-bit Systems | Remote Code Execution | Important | 5068791 | Security Update | CVE-2025-64678 |
| Microsoft Word 2016 (64-bit edition) | Remote Code Execution | Important | 5002806 | Security Update | CVE-2025-62559 |
| Microsoft SharePoint Server 2019 | Remote Code Execution | Important | 5002816 | Security Update | CVE-2025-62559 |
| Microsoft SharePoint Server 2019 | Remote Code Execution | Important | 5002802 | Security Update | CVE-2025-62559 |
| Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Important | 5002821 | Security Update | CVE-2025-62559 |
| Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Important | 5002804 | Security Update | CVE-2025-62559 |
| Microsoft Office for Android | Remote Code Execution | Critical | Release Notes | Security Update | CVE-2025-62557 |
| Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Critical | 5002819 | Security Update | CVE-2025-62557 |
| Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Critical | 5002819 | Security Update | CVE-2025-62557 |
| Microsoft Access 2016 (64-bit edition) | Remote Code Execution | Important | 5002812 | Security Update | CVE-2025-62552 |
| Microsoft Access 2016 (32-bit edition) | Remote Code Execution | Important | 5002812 | Security Update | CVE-2025-62552 |
| Microsoft Exchange Server 2019 Cumulative Update 14 | Elevation of Privilege | Important | 5071874 | Security Update | CVE-2025-64666 |
| Microsoft Exchange Server 2016 Cumulative Update 23 | Elevation of Privilege | Important | 5071873 | Security Update | CVE-2025-64666 |
| Microsoft Exchange Server 2019 Cumulative Update 15 | Elevation of Privilege | Important | 5071875 | Security Update | CVE-2025-64666 |
| azl3 kernel 6.6.112.1-2 | Moderate | CVE-2025-40324 | |||
| azl3 kernel 6.6.117.1-1 | Moderate | CVE-2025-40305 |
Microsoft has rolled out the KB5072033 update for Windows 11 versions 25H2 and 24H2. This update brings several new features and capabilities for customers with Copilot+ PCs. The AI agent in Settings now provides an enhanced search experience with more results, quick-change recommendations, and explanatory dialogs. The Click to Do menu is also streamlined for easier access, and Windows Studio Effects supports secondary USB webcams.
Additionally, Microsoft has fixed a bug that was previously causing external virtual switches to lose their physical network adapter (NIC) bindings after a host restart. Moreover, the company has fixed a File Explorer that caused the app to flash white when users navigated between pages briefly. In PowerShell, the Invoke-WebRequest now includes a confirmation prompt with a security warning of script execution risk.
Microsoft advises organizations to perform thorough testing to confirm that updates do not compromise the stability of their production systems. However, it is crucial to deploy Patch Tuesday updates to proactively address potential threats.
Additionally, IT administrators must prioritize backing up their systems before applying updates, utilizing the built-in backup features of Windows and Windows Server. These features allow for the restoration of specific files and folders or entire systems as required.
Last but not least, organizations should consistently monitor their systems for anomalies or unexpected behaviors. Regular monitoring is essential for staying vigilant against emerging risks and adopting appropriate security measures.