News

Microsoft’s November Security Update of High-Risk Vulnerability Notice for Multiple Products

  • None--securityboulevard.com
  • published date: 2025-11-13 00:00:00 UTC

None

<h2>Overview</h2><p>On November 12, NSFOCUS CERT detected that Microsoft released the November Security Update patch, which fixed 63 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Azure, and Microsoft Visual Studio, including privilege escalation, high-risk vulnerability types such as remote code execution.</p><p>Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 5 critical (Critical) and 58 important (Important), including 1 0day that has been detected for wild exploitation: Windows Kernel Privilege Escalation Vulnerability (CVE-2025-62215). Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.</p><div class="code-block code-block-13" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-13-1" data-info="WyIxMy0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="U2hvcnQ=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/cruisecon-virtual-west-2025/home?ref=in-article-ad-2&amp;utm_source=sb&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-2" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2025/10/Banner-770x330-social-1.png" alt="Cruise Con 2025"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p>Reference link: <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Nov">https://msrc.microsoft.com/update-guide/releaseNote/2025-Nov</a></p><h2>Key Vulnerabilities</h2><p>Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:</p><p><strong>Windows Kernel Privilege Escalation Vulnerability (CVE-2025-62215):</strong></p><p>A privilege escalation vulnerability exists in the Windows Kernel. Due to a concurrent synchronization flaw in the Windows kernel’s processing of shared resources, an authenticated local attacker can elevate privileges to SYSTEM by triggering race conditions and double release. The vulnerability has been exploited in the wild.CVSS score 7.0.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215</a></p><p><strong>DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2025-60716):</strong></p><p>There is a privilege escalation vulnerability in the DirectX Graphics Kernel. Because the DirectX graphics kernel does not reset the pointer after releasing GPU resources, an authenticated local attacker can reuse (use-after-free) kernel objects through conditional competition release, thereby escalating privileges to SYSTEM. CVSS score 7.0.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-60716">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-60716</a></p><p><strong>Nuance PowerScribe 360 Information Disclosure Vulnerability (CVE-2025-30398):</strong></p><p>There is an information disclosure vulnerability in Nuance PowerScribe 360. Because PowerScribe lacks authorization for API endpoints, unauthenticated attackers can obtain sensitive information such as PowerScribe configuration by requesting to call specific API endpoints. CVSS score 8.1.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30398">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30398</a></p><p><strong>Microsoft Office Remote Code Execution Vulnerability (CVE-2025-62199):</strong></p><p>A remote code execution vulnerability exists in Microsoft Office. Since Microsoft Office does not clear the pointer (use-after-free) after releasing the object, an attacker can trick the user into opening or previewing a pane by delivering a specially crafted file, thereby executing arbitrary code on the user’s computer. CVSS score 7.8.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62199">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62199</a></p><p><strong>Visual Studio Remote Code Execution Vulnerability (CVE-2025-62214):</strong></p><p>A remote code execution vulnerability exists in Visual Studio. Since Visual Studio does not escape the special characters in the prompt when calling Copilot to generate a build command, an authenticated local attacker can trigger the build by injecting malicious instructions into Copilot, thereby achieving arbitrary code execution. CVSS score 6.7.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62214">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62214</a></p><p><strong>Customer Experience Improvement Program Privilege Escalation Vulnerability (CVE-2025-59512):</strong></p><p>A privilege escalation vulnerability exists in the Customer Experience Improvement Program. Due to improper customer experience improvement program (CEIP) access control, an authenticated local attacker can bypass privilege verification and execute malicious code to elevate privileges to SYSTEM. CVSS score 7.8.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59512">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59512</a></p><p><strong>GDI+ Remote Code Execution Vulnerability (CVE-2025-60724):</strong></p><p>There is a remote code execution vulnerability in the Windows GDI+ component. Since the GDI+ component will cause a heap buffer overflow when parsing specially crafted metafile files, an unauthenticated attacker can upload malicious files to the Web service that parses the document to achieve remote code execution. CSS score 9.8.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-60724">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-60724</a></p><p><strong>Dynamics 365 Field Service (online) Spoofing Vulnerability (CVE-2025-62210)</strong></p><p>A spoofing vulnerability exists in the Dynamics 365 Field Service, which allows an unauthenticated attacker to hijack user sessions by tricking users into clicking on malicious links and injecting and executing arbitrary XSS scripts due to improper handling of user input when generating web pages. CVSS score 8.7.</p><p>Official announcement link:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62210">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62210</a></p><h2>Scope of Impact</h2><p>The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.</p><figure class="wp-block-table is-style-stripes"> <table> <thead> <tr> <th><strong>Vulnerability Number</strong></th> <th><strong>Affected product versions</strong></th> </tr> </thead> <tbody> <tr> <td>CVE-2025-62215 <br>CVE-2025-60716</td> <td>Windows 10 Version 1809 for 32-bit Systems <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows Server 2019 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows Server 2025 <br>Windows Server 2025 (Server Core installation)</td> </tr> <tr> <td>CVE-2025-30398</td> <td>Nuance PowerScribe 360 version 4.0.1 <br>Nuance PowerScribe 360 version 4.0.2 <br>Nuance PowerScribe 360 version 4.0.3 <br>Nuance PowerScribe 360 version 4.0.4 <br>Nuance PowerScribe 360 version 4.0.5 <br>Nuance PowerScribe 360 version 4.0.6 <br>Nuance PowerScribe 360 version 4.0.7 <br>Nuance PowerScribe 360 version 4.0.8 <br>Nuance PowerScribe 360 version 4.0.9 <br>Nuance PowerScribe One version 2019.1 <br>Nuance PowerScribe One version 2019.2 <br>Nuance PowerScribe One version 2019.3 <br>Nuance PowerScribe One version 2019.4 <br>Nuance PowerScribe One version 2019.5 <br>Nuance PowerScribe One version 2019.6 <br>Nuance PowerScribe One version 2019.7 <br>Nuance PowerScribe One version 2019.8 <br>Nuance PowerScribe One version 2019.9 <br>Nuance PowerScribe One version 2019.10 <br>PowerScribe One version 2023.1 SP2 Patch 7</td> </tr> <tr> <td>CVE-2025-62199</td> <td>Microsoft 365 Apps for Enterprise for 32-bit Systems <br>Microsoft 365 Apps for Enterprise for 64-bit Systems <br>Microsoft Office for Android <br>Microsoft Office 2016 (32-bit edition) <br>Microsoft Office 2016 (64-bit edition) <br>Microsoft Office LTSC 2021 for 32-bit editions <br>Microsoft Office LTSC 2021 for 64-bit editions <br>Microsoft Office LTSC 2024 for 32-bit editions <br>Microsoft Office LTSC 2024 for 64-bit editions <br>Microsoft Office LTSC for Mac 2021 <br>Microsoft Office LTSC for Mac 2024</td> </tr> <tr> <td>CVE-2025-62214</td> <td>Microsoft Visual Studio 2022 version 17.14</td> </tr> <tr> <td>CVE-2025-59512</td> <td>Windows 10 Version 1607 for 32-bit Systems <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows Server 2012 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2016 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2019 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows Server 2025 <br>Windows Server 2025 (Server Core installation)</td> </tr> <tr> <td>CVE-2025-60724</td> <td>Microsoft Office LTSC for Mac 2021 <br>Microsoft Office LTSC for Mac 2024 <br>Microsoft Office for Android <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) <br>Windows Server 2008 for 32-bit Systems Service Pack 2 <br>Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) <br>Windows Server 2008 for x64-based Systems Service Pack 2 <br>Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2016 <br>Windows Server 2016 (Server Core installation)<br>Windows Server 2019 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows Server 2025 <br>Windows Server 2025 (Server Core installation)</td> </tr> <tr> <td>CVE-2025-62210</td> <td>Dynamics 365 Field Service (online)</td> </tr> </tbody> </table> </figure><h2>Mitigation</h2><p>At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:</p><p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Nov">https://msrc.microsoft.com/update-guide/releaseNote/2025-Nov</a></p><p>Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.</p><p>Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.</p><p>For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.</p><h2>Appendix</h2><figure class="wp-block-table is-style-stripes"> <table class="has-fixed-layout"> <thead> <tr> <th><strong>Affected products</strong></th> <th><strong>CVE No.</strong></th> <th><strong>Vulnerability Title</strong></th> <th><strong>Severity</strong></th> </tr> </thead> <tbody> <tr> <td>Microsoft Office</td> <td>CVE-2025-62199</td> <td>Microsoft Office Remote Code Execution Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Microsoft Office,Windows</td> <td>CVE-2025-60724</td> <td>GDI+ remote code execution vulnerability</td> <td>Critical</td> </tr> <tr> <td>Microsoft Visual Studio</td> <td>CVE-2025-62214</td> <td>Visual Studio Remote Code Execution Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Other</td> <td>CVE-2025-30398</td> <td>Nuance PowerScribe 360 Information Disclosure Vulnerability</td> <td>Critical</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60716</td> <td>DirectX Graphics Kernel privilege escalation vulnerability</td> <td>Critical</td> </tr> <tr> <td>Azure</td> <td>CVE-2025-59504</td> <td>Azure Monitor Agent Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Dynamics</td> <td>CVE-2025-62206</td> <td>Microsoft Dynamics 365 (On-Premises) information disclosure vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Dynamics</td> <td>CVE-2025-62210</td> <td>Dynamics 365 Field Service (online) spoofing vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Dynamics</td> <td>CVE-2025-62211</td> <td>Dynamics 365 Field Service (online) spoofing vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-60726</td> <td>Microsoft Excel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-60727</td> <td>Microsoft Excel remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-60728</td> <td>Microsoft Excel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62216</td> <td>Microsoft Office Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-60722</td> <td>Microsoft OneDrive for Android Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-59240</td> <td>Microsoft Excel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62200</td> <td>Microsoft Excel remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62201</td> <td>Microsoft Excel remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62202</td> <td>Microsoft Excel Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62203</td> <td>Microsoft Excel remote code execution vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62204</td> <td>Microsoft SharePoint Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Office</td> <td>CVE-2025-62205</td> <td>Microsoft Office Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft SQL Server</td> <td>CVE-2025-59499</td> <td>Microsoft SQL Server Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Visual Studio Code CoPilot Chat Extension</td> <td>CVE-2025-62222</td> <td>Agentic AI and Visual Studio Code Remote Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Microsoft Visual Studio Code CoPilot Chat Extension</td> <td>CVE-2025-62449</td> <td>Microsoft Visual Studio Code CoPilot Chat Extension security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Open Source Software</td> <td>CVE-2025-62220</td> <td>Windows Subsystem for Linux GUI Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>System Center</td> <td>CVE-2025-47179</td> <td>Configuration Manager privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Visual Studio Code</td> <td>CVE-2025-62453</td> <td>GitHub Copilot and Visual Studio Code security feature bypass vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59505</td> <td>Windows Smart Card Reader privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59506</td> <td>DirectX Graphics Kernel privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59507</td> <td>Windows Speech Runtime Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59508</td> <td>Windows Speech Recognition Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59509</td> <td>Windows Speech Recognition Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59510</td> <td>Windows Routing and Remote Access Service (RRAS) Denial of Service</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59511</td> <td>Windows WLAN Service Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59512</td> <td>Customer Experience Improvement Program (CEIP) privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59513</td> <td>Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60703</td> <td>Windows Remote Desktop Services Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60704</td> <td>Windows Kerberos privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60705</td> <td>Windows Client-Side Caching Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60706</td> <td>Windows Hyper-V Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60707</td> <td>Multimedia Class Scheduler Service (MMCSS) Driver Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60708</td> <td>Storvsp.sys Driver denial of service vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60709</td> <td>Windows Common Log File System Driver Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60710</td> <td>Host Process for Windows Tasks Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60719</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62217</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62218</td> <td>Microsoft Wireless Provisioning System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62219</td> <td>Microsoft Wireless Provisioning System Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62452</td> <td>Windows Routing and Remote Access Service (RRAS) Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59514</td> <td>Microsoft Streaming Service Proxy Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-59515</td> <td>Windows Broadcast DVR User Service Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60713</td> <td>Windows Routing and Remote Access Service (RRAS) privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60714</td> <td>Windows OLE Remote Code Execution Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60715</td> <td>Windows Routing and Remote Access Service (RRAS) Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60717</td> <td>Windows Broadcast DVR User Service Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60718</td> <td>Windows Administrator Protection Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60720</td> <td>Windows Transport Driver Interface (TDI) Translation Driver Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60723</td> <td>DirectX Graphics Kernel denial of service vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62208</td> <td>Windows License Manager Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62209</td> <td>Windows License Manager Information Disclosure Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62215</td> <td>Windows Kernel privilege escalation vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-62213</td> <td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability</td> <td>Important</td> </tr> <tr> <td>Windows</td> <td>CVE-2025-60721</td> <td>Windows Administrator Protection Privilege Escalation Vulnerability</td> <td>Important</td> </tr> </tbody> </table> </figure><h2>Statement</h2><p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.</p><h2>About NSFOCUS</h2><p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.</p><p>Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.</p><p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.</p><p>The post <a rel="nofollow" href="https://nsfocusglobal.com/microsofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products/">Microsoft’s November Security Update of High-Risk Vulnerability Notice for Multiple Products</a> appeared first on <a rel="nofollow" href="https://nsfocusglobal.com/">NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/11/microsofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products/" data-a2a-title="Microsoft’s November Security Update of High-Risk Vulnerability Notice for Multiple Products"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fmicrosofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20November%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fmicrosofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20November%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fmicrosofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20November%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fmicrosofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20November%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fmicrosofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products%2F&amp;linkname=Microsoft%E2%80%99s%20November%20Security%20Update%20of%20High-Risk%20Vulnerability%20Notice%20for%20Multiple%20Products" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://nsfocusglobal.com/">NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by NSFOCUS">NSFOCUS</a>. Read the original post at: <a href="https://nsfocusglobal.com/microsofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products/">https://nsfocusglobal.com/microsofts-november-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</a> </p>