<img height="1" width="1" src="https://www.facebook.com/tr?id=565881886425595&amp;ev=PageView &amp;noscript=1">

Patch Tuesday: August 2025

Welcome to August! The latest Patch Tuesday update dropped yesterday, releasing updates for 107 vulnerabilities. and fixing 1 publicly disclosed vulnerability.

Pssst... did you know that you can now set up AutoFix rules for Windows Updates with RoboShadow's Cyber Heal function? 

You can find a full list of security updates for August here.

Untitled design - 2025-03-11T150711.004

Key Updates

  • 107 Vulnerabilities Patched
  • 1 publicly disclosed zero-day
  • 13 critical vulnerabilities

 

Vulnerability Types Released in August 2025:

Patch Tuesday Summary August 2025

 

Zero Day Vulnerabilities 

CVE-2025-53779 – Windows Kerberos Elevation of Privilege

  • CVSS Score 7.2 (Moderate)
  • Description: This is an Elevation of Privilege (EoP) vulnerability in Windows Kerberos, also publicly disclosed as a zero‑day and referred to as “BadSuccessor.”

    It involves relative path traversal in Windows Kerberos. Exploiting it allows an authenticated attacker to escalate further and obtain domain administrator privileges over a network.  

  • Exploitation Status: Publicly disclosed zero-day; no known active exploitation; exploitation considered less likely.
 

Critical Vulnerability Summary

The following critical CVEs have been remediated this month, and should be patched as soon as possible:

CVE CVSS Description Summary
CVE-2025-50165 9.8 RCE in Windows graphics via JPEG decoding without user interaction

CVE-2025-53766 9.8 GDI+ RCE via heap overflow using malicious metafiles, no user interaction needed
CVE-2025-53778 8.8 NTLM EoP bug allowing SYSTEM-level elevation over network; exploitation more likely
CVE-2025-53740 8.4 Use-after-free RCE in Microsoft Office (Preview Pane)
CVE-2025-53731 8.4 Use-after-free RCE in Microsoft Office (Preview Pane)
CVE-2025-53784 8.4 Use-after-free RCE in Microsoft Word (Preview Pane)
CVE-2025-53733 8.4 RCE in Microsoft Word via numeric conversion error (Preview Pane)
CVE-2025-50177 8.1 MSMQ RCE via use-after-free and race condition exploiting HTTP packets
CVE-2025-49707 7.9 Azure VM spoofing via improper access control
CVE-2025-50176 7.8 RCE in DirectX Graphics Kernel via type confusion
CVE-2025-53781 7.7 Azure VM information disclosure by low-privilege attacker
CVE-2025-53793 7.5 Azure Stack Hub information disclosure
CVE-2025-48807 7.5 RCE in Hyper-V—nested VM escape to guest admin

 

launcher-svgrepo-com-2


Actions to Take:

Here is what IT teams should prioritise this month:

  • Patch Immediately:  Immediately deploy fixes for CVE-2025-50165, CVE-2025-53766, and CVE-2025-53778, as these have the highest CVSS scores and/or are more likely to be exploited. Also apply the patch for CVE-2025-53779 (Windows Kerberos EoP zero-day) without delay, even though exploitation is currently considered less likely.

  • Update All Systems Running Office and Word: The multiple use-after-free RCE vulnerabilities in Microsoft Office and Word can be triggered via the Preview Pane, meaning a malicious document can execute code without being opened. Disable the Preview Pane where patching is not yet complete.

  • Patch Internet-Facing Systems First: Apply updates to all public-facing servers and services before internal systems, especially Azure VMs, Hyper-V hosts, and DirectX-enabled systems.4

  • Audit and Monitor Kerberos and NTLM Traffic:  For CVE-2025-53779 and CVE-2025-53778, review authentication logs for unusual patterns, failed login bursts, or unexpected privilege escalations.


Frame

 
Did you know? You can use the RoboShadow platform to scan for vulnerabilities, check your Windows Updates and also patch any outstanding software updates using Cyber Heal?

7. Device Security Updates SQUARE

 

If you have any questions about Patch Tuesday, or feedback on this blog please
reach out to us: hello@roboshadow.com 

Thanks for reading!

Posted by Liz Teague

Image of blog writer

With a decade of experience in operations, compliance, and security operations at a leading MSP, Liz is now dedicated to the field of cybersecurity, where she supports RoboShadow in its mission to make cybersecurity accessible to everyone.

Blog Author LinkedIn