Microsoft's August 2025 Patch Tuesday addressed 111 vulnerabilities across its software ecosystem, including a Windows Kerberos zero-day flaw that could allow attackers to seize entire Active Directory domains. Among these, 13 were critical remote code execution (RCE) vulnerabilities, with some affecting Azure OpenAI, Microsoft 365 Copilot, Edge, SharePoint Server, and Exchange Server. Security experts advised prioritizing patches for domain controllers, Exchange, and SharePoint. Concurrently, Fortinet warned of a critical FortiSIEM vulnerability (CVE-2025-25256) with active exploit code in the wild, enabling unauthenticated attackers to execute commands. N-able confirmed limited exploitation of two critical-severity flaws in its N-central remote monitoring and management (RMM) tool, with patches available and a CISA warning urging updates by August 20 to prevent takeover. Additional vulnerabilities in Microsoft Internet Explorer, Microsoft Office Excel, WinRAR, and Xerox FreeFlow Core software were also added to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities catalog. Despite advisories, over 29,000 instances of a high-severity on-premises Exchange Server flaw remain unpatched. Zoom also patched a critical Windows privilege escalation flaw. The overall security landscape underscores the urgency for administrators to implement these updates promptly to mitigate risks posed by active exploits and emerging threats.
CISA Warns N-able Bugs Under Attack, Patch Now: https://t.co/P7v9dbtGh7 by darkreading #infosec #cybersecurity #technology #news
Admins should prioritize patches for domain controllers, Exchange and SharePoint after @Microsoft released fixes for those systems on August #PatchTuesday. https://t.co/UbCodPtiOY
.@Xerox patched two flaws in its FreeFlow Core software, including a critical path traversal bug that could lead to remote code execution (RCE), @Horizon3ai reported. #cybersecurity #infosec #ITsecurity https://t.co/J6Y8taOQH6