On August 14, 2025, Microsoft released its August Patch Tuesday addressing 111 vulnerabilities in Microsoft products and an additional 8 non-Microsoft CVEs, totaling 119 security flaws. These span Windows, Microsoft Office, Exchange Server, SharePoint, SQL Server, Azure services, and Microsoft 365 applications. The vulnerabilities include Remote Code Execution (RCE), Elevation of Privilege (EoP), Information Disclosure, Spoofing, Tampering, and Denial of Service (DoS). With 21 CVEs flagged as high-risk or actively exploitable, enterprises must patch immediately to avoid compromise.
The most notable disclosure is CVE-2025-53779 “BadSuccessor”, a Kerberos Elevation of Privilege vulnerability involving path traversal in delegated Managed Service Accounts (dMSAs). Attackers could escalate privileges to domain administrator, posing significant risks in enterprise Active Directory environments.
This vulnerability affects Exchange Server 2016 and 2019 in hybrid deployments. Attackers with on-premises Exchange admin rights can pivot into Exchange Online and Office 365, risking cloud account takeovers.
A critical Windows NTLM vulnerability rated CVSS 8.8, flagged as “Exploitation More Likely.” It could allow attackers to escalate privileges and move laterally across Windows environments.
A remote code execution (RCE) vulnerability in Microsoft Message Queuing, triggered by crafted network packets, allowing remote takeover of Windows servers.
Multiple graphics rendering flaws, including heap overflows and malicious JPEG handling, enable remote code execution by simply opening or viewing crafted image files.
17 Critical vulnerabilities
91 Important vulnerabilities
2 Moderate vulnerabilities
1 Low severity vulnerability
In total:
35 Remote Code Execution (RCE) issues
44 Elevation of Privilege (EoP) flaws
18 Information Disclosure
9 Spoofing vulnerabilities
4 Denial of Service (DoS)
1 Tampering vulnerability
The August updates target a wide range of products, including:
Windows 10, Windows 11, Windows Server (2008 – 2025)
Microsoft Office (Word, Excel, PowerPoint, Visio, Outlook)
Microsoft Exchange Server (2016, 2019)
Microsoft SharePoint (2016 – 2019)
Microsoft SQL Server
Microsoft Hyper-V
Azure Virtual Machines, Azure OpenAI, Azure Stack Hub
Microsoft 365 Copilot and GitHub Copilot integrations
Microsoft’s advisory links the vulnerabilities to multiple MITRE ATT&CK tactics and techniques, including:
TA0001 Initial Access: Phishing (T1566), Exploit Public-Facing Applications (T1190)
TA0002 Execution: Command & Scripting Interpreter (T1059), Exploitation for Client Execution (T1203)
TA0004 Privilege Escalation: Exploitation for Privilege Escalation (T1068), Pass-the-Ticket (T1550.003), Kerberos Ticket Forgery (T1558)
TA0006 Credential Access: Valid Accounts (T1078), Modify Authentication Process (T1556)
TA0040 Impact: Endpoint Denial of Service (T1499), Hybrid-cloud exploitation vectors
Prioritize patching of critical CVEs: CVE-2025-53779, CVE-2025-53786, CVE-2025-53778, CVE-2025-50177, CVE-2025-53766, CVE-2025-50165.
Conduct service exposure evaluation to identify and secure internet-facing services.
Implement network segmentation to contain lateral movement and limit attacker reach.
Apply least privilege principles to reduce impact of privilege escalation flaws.
Harden device configurations and update endpoint defenses against RCE and EoP exploits.
With 119 vulnerabilities addressed, including 21 high-risk and actively exploitable flaws, Microsoft’s August 2025 Patch Tuesday represents one of the most critical patch cycles of the year. From Kerberos domain escalation to Exchange hybrid cloud compromises and remote code execution in graphics and messaging services, this release underscores the urgency of proactive vulnerability management. Organizations that fail to patch quickly risk domain-wide compromise, cloud breaches, and business disruption.
Get through updates and upcoming events, and more directly in your inbox