Threat and Security Update – October, 2025

Share This Article


Stay Ahead of Threats with the Latest Vulnerability Updates for October


Stay up to date on critical cyber risks, Microsoft’s October Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. 

Quick Highlights

  • Windows 10 End of Support 
    – Final patch released October 14 
    – No more updates unless enrolled in Extended Security Updates (ESU) or upgraded to Windows 11 
    – Now is the time to assess your upgrade path 
  • Microsoft Patch Tuesday: 
    – 175 vulnerabilities disclosed 
    – 17 rated Critical, 6 are Zero-Day (3 actively exploited) 
  • Adobe Security Updates: 
    – 36 vulnerabilities patched across 12 products 
    – 24 rated Critical, affecting Illustrator, FrameMaker, Creative Cloud, and more 
  • High-Severity Advisories from Major Vendors: 
    Cisco: 4 high-severity flaws, including SNMP RCE and Secure Boot bypass 
    Fortinet: 2 high-severity flaws in FortiPAM and FortiOS 
    SAP: 3 critical vulnerabilities in NetWeaver, Print Service, and SRM 
    Ivanti: 5 high-severity flaws in EPMM and Neurons for MDM 
  • Top Threats to Watch: 
    Crimson Collective targeting AWS with leaked keys and extortion tactics 
    VMware CVE-2025-41244 zero-day exploited for privilege escalation 
    Quishing 2.0: QR code phishing attacks evolving in sophistication 
    Ransomware Cartel: LockBit, DragonForce & Qilin collaborating 
    Oyster Malware via fake Microsoft Teams installers 
    Weaponized DFIR Tools: Velociraptor abused in ransomware attacks 
    AI-Driven Threats: ShadowLeak zero-click exploit in ChatGPT; AI-generated phishing and malware 

Windows 10 Reaches End of Support

As of October 14, 2025, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the final security update for the OS—unless your organization enrolls in the Extended Security Updates (ESU) program. 

What This Means for Your Organization: 

  • No more security patches or bug fixes for Windows 10 devices 
  • Increased exposure to vulnerabilities and compliance risks 
  • Continued support requires either:  
    – Enrolling in Microsoft’s paid ESU program, or
    Upgrading to Windows 11 

Need help planning your transition? 
Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure. 

Patch Tuesday Summary

Microsoft October 2025 Patch Tuesday 
175 vulnerabilities disclosed, including 8 critical and 6 zero-days. By category: 

  • 80 Elevation of Privilege 
  • 31 Remote Code Execution
  • 28 Information Disclosure
  • 11 Security Feature Bypass 
  • 11 Denial of Service 
  • 10 Spoofing 

Critical Common Vulnerabilities and Exposures (CVEs)

Windows Zero-Days

CVE-ID Details Severity Exploited? 
CVE-2025-24990 Windows Agere Modem Driver Elevation of Privilege Vulnerability High Yes 
CVE-2025-24052 Windows Agere Modem Driver Elevation of Privilege Vulnerability High No 
CVE-2025-59230 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability High Yes 
CVE-2025-47827 Secure Boot bypass in IGEL OS before 11 Medium Yes 
CVE-2025-0033 RMP corruption during SNP initialization in AMD Restricted Memory Page Medium No 
CVE-2025-2884 Out-of-bounds read bug in TCG TPM2.0 reference implementation. Medium No 

Other Critical CVE’s Worth Mentioning

CVE-ID Details Severity Exploited? 
CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability Critical No 
CVE-2025-59246 CVE-2025-59218 Azure Entra ID Elevation of Privilege Vulnerability Critical No 
CVE-2025-59234 Microsoft Office Remote Code Execution Vulnerability Critical No 
CVE-2025-49708 Microsoft Graphics Component Elevation of Privilege Vulnerability Critical No 
CVE-2025-59291 Elevation of Privilege Flaw in Confidential Azure Container Instances Critical No 
CVE-2025-59292 Elevation of Privilege Flaw in Azure Compute Gallery Critical No 
CVE-2025-59227 Remote Code Execution Vulnerability in Microsoft Office Critical No 
CVE-2025-59247 Elevation of Privilege Flaw in Azure PlayFab Critical No 
CVE-2025-59252 CVE-2025-59272 CVE-2025-59286 M365 Copilot Spoofing Vulnerability Critical No 
CVE-2025-59271 Elevation of Privilege Flaw in Redis Enterprise Critical No 
CVE-2025-55321 Spoofing Vulnerability in Azure Monitor Log Analytics Critical No 
CVE-2025-59236 Remote Code Execution Vulnerability in Microsoft Excel Critical No 
CVE-2016-9535 Heap Bugger Overflow in LibTIFF Critical No 

3rd Party Critical CVE’s Worth Mentioning

Adobe Products *

CVE-ID(s) Affected Product Critical Issues Key Risks 
CVE-2025-49552 CVE-2025-49553 CVE-2025-54196 Connect https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 2 Critical Arbitrary code execution Security feature bypass 
CVE-2025-54263 CVE-2025-54264 CVE-2025-54265 CVE-2025-54266 CVE-2025-54267 Commerce  2 Critical Security feature bypass Privilege escalation Arbitrary code execution 
CVE-2025-54271 Creative Cloud 0 Critical Arbitrary file system write 
CVE-2025-54268 CVE-2025-54278 Bridge  1 Critical Arbitrary code execution Memory exposure 
CVE-2025-54279 CVE-2025-61804 CVE-2025-54269 CVE-2025-54270 Animate  2 Critical Arbitrary code execution Memory exposure 
CVE-2025-54272 CVE-2025-61796 CVE-2025-61797 Experience Manager Screens 0 Critical Arbitrary code execution 
CVE-2025-54273 CVE-2025-54274 CVE-2025-54280 CVE-2025-54275 Substance 3D Viewer 3 Critical Arbitrary code execution Application DoS 
CVE-2025-54276 Substance 3D Modeler 1 Critical Arbitrary code execution 
CVE-2025-54281 CVE-2025-54282 FrameMaker 2 Critical Arbitrary code execution 
CVE-2025-54283 CVE-2025-54284 Illustrator 2 Critical Arbitrary code execution 
CVE-2025-61798 CVE-2025-61799 CVE-2025-61800 CVE-2025-61801 Dimension  4 Critical Arbitrary code execution 
CVE-2025-61802 CVE-2025-61803 CVE-2025-61805 CVE-2025-61806 CVE-2025-61807 Substance 3D Stager 5 Critical Arbitrary code execution 

Adobe Security Bulletins → 

Cisco *

CVE-ID(s) Affected Product Description Severity Exploited? 
CVE-2025-20350 CVE-2025-20351https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 SIP software DoS vulnerabilities High No 
CVE-2025-20313 CVE-2025- 20314 Cisco IOS XE  Secure Boot Bypass High No 
CVE-2025-20352 Cisco IOS / IOS XE  SNMP RCE & DoS High Yes 
CVE-2025-20160 Cisco IOS and IOS XE TACACS+ Authentication Bypass High No 

Cisco Security Advisories → 

Fortinet *

CVE-ID Affected Product Description Severity Exploited? 
CVE-2025-49201https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 FortiPAM and FortiSwitch Manager  Weak authentication allows brute-force bypass High No 
CVE-2025-58325 FortiOS  Local authenticated attacker can execute system commands High No 

Fortinet PSIRT Advisories → 

Ivanti *

CVE-ID(s) Affected Product Description Severity Exploited? 
CVE-2025-10242  CVE-2025-10243 CVE-2025-10985 CVE-2025-10986
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 
Ivanti EPMM  OS Command Injection and Path traversals via remote authenticated attacker High No 
CWE-862 CWE-308 CWE-306 Ivanti Neurons for MDM Missing authentication and MFA bypass  High No 

Ivanti October 2025 Security Update → 

SAP *

CVE-ID Affected Component Description Severity Exploited? 
CVE-2025-42944
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 
SAP NetWeaver AS Java Insecure Deserialization Critical No 
CVE-2025-42937 SAP Print Service Directory Traversal Vulnerability Critical No 
CVE-2025-42910 SAP Supplier Relationship Management Unrestricted File Upload Flaw Critical No 

SAP October 2025 Security Notes  

Google Chrome

  • Version: 141.0.7390.107/.108 (Windows and Mac), 141.0.7390.107 (Linux) 
  • Release Date: October 14, 2025 
  • Key Fixes: Security fix for CVE-2025-11756 

Chrome Release Notes → 

* Not handled by Fortress SRM. 

Threat Intelligence Trends – October 2025

The following resources are grouped by threat type / category. 

Emerging Threats

Crimson Collective Targeting Cloud Environments 

A newly identified threat group, Crimson Collective, has been observed compromising AWS environments using leaked long-term access keys. They escalate privileges via IAM policies, exfiltrate sensitive data, and follow up with extortion attempts. Read more →  

Zero-Day Alert: VMware CVE-2025-41244 Privilege Escalation 

NVISO Labs identified active exploitation of CVE-2025-41244, a local privilege escalation flaw in VMware’s guest service discovery. The vulnerability allows attackers to elevate privileges and potentially pivot within virtualized environments. Read more → 

Quishing 2.0: QR Code Phishing Evolves 

Cybercriminals are refining quishing attacks using fake QR codes embedded in emails, flyers, and public spaces. These codes redirect users to phishing sites or initiate malware downloads. Read more → 

Ransomware & Malware Deployment

LockBit, DragonForce & Qilin Form Ransomware Cartel 

Three major ransomware groups have formed a criminal cartel to coordinate attacks and share infrastructure. Read more →  

Malvertising Campaign: Oyster Malware via Fake Teams Installers 

Threat actors are using SEO poisoning and malicious ads to distribute trojanized Microsoft Teams installers. These fake installers deploy Oyster (aka Broomstick), a modular backdoor that enables persistent remote access and stealthy data exfiltration. Read more → 

Velociraptor DFIR Tool Weaponized 

Threat actors are abusing the legitimate Velociraptor forensic tool to deploy ransomware like LockBit and Babuk. This marks a troubling trend of security tools being repurposed for attacks. Read more →

Group: Storm-2603 (China-based) 

Cephalus Ransomware via DLL Sideloading 

A new ransomware variant, Cephalus, uses DLL sideloading through SentinelOne binaries and RDP access without MFA. Read more → 

Cloud & Infrastructure Exploits

SonicWall SSLVPN Exploitation 

Akira ransomware actors are exploiting SonicWall VPNs using BYOVD techniques and clearing logs to evade detection. Read more → 

Discord Data Breach via Third-Party Vendor 

A breach at Discord’s support vendor exposed 70,000 government ID photos and personal data. Read more → 

Clop Claims Oracle E-Business Suite Data Theft 

The Clop ransomware group has reportedly sent extortion emails claiming to have stolen data from Oracle E-Business Suite environments. While the full scope of the breach is unclear, the tactic aligns with Clop’s recent shift toward data-centric extortion rather than encryption. Read more → 

AI-Driven Threats

AI-Powered Malware & Phishing 

Russia-linked groups are using AI to generate phishing lures and malware like WRECKSTEEL and GIFTEDCROOK. Read more → 

Zero-Click AI Exploit: ShadowLeak Vulnerability in ChatGPT 

Radware disclosed ShadowLeak, a zero-click prompt injection vulnerability in ChatGPT’s enterprise integrations. Malicious emails can silently trigger data exfiltration from OpenAI’s servers without user interaction, bypassing traditional security controls. Read more → 

Recommended Actions

Mitigations

  • Prioritize patching all actively exploited zero-days from Microsoft and VMware. 
  • Disable unused services on Cisco IOS XE and Fortinet appliances to reduce attack surface. 
  • Enforce MFA across all cloud and identity platforms. 
  • Restrict QR code scanning on unmanaged devices to mitigate quishing attacks. 
  • Update endpoint protection to detect AI-generated malware variants. 

Monitoring

  • Watch for suspicious authentication attempts in Azure, Fortinet, and Ivanti logs. 
  • Monitor for unexpected outbound traffic from Teams or Office installations (possible Oyster malware). 
  • Track file uploads and downloads in SAP SRM and Print Service environments. 
  • Set alerts for SNMP activity spikes on Cisco devices (possible CVE-2025-20352 exploitation). 

Detection Tips

  • Use YARA or Sigma rules to detect:  
    Velociraptor misuse in ransomware campaigns 
    ShadowLeak zero-click exploit indicators in AI platforms 
  • Deploy honeypots or deception tools to detect brute-force attempts on FortiPAM and Secure Boot bypass attempts on Cisco IOS XE.  
  • Leverage threat intel feeds to identify Crimson Collective and LockBit cartel infrastructure. 

About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering 

Why Patching Matters

Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities. 

Vigilant Managed Cyber Hygiene

 Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management. 

  • Automated updates with 97%+ success rate for Microsoft & 100+ third-party applications 
  • Critical patches, OS upgrades, and configuration updates for all devices, on/off network 
  • 24/7/365 U.S.-based monitoring and real-time reporting for full visibility 

Stay Protected. Stay Proactive.

Learn how Fortress SRM can enhance your cybersecurity strategy →