EoP Flaws Again Lead Microsoft Patch Tuesday
Summary
Microsoft’s September 2025 security update fixes 81 unique CVEs, with elevation-of-privilege (EoP) bugs making up the largest share — 38 vulnerabilities. EoP issues can let attackers turn an initial foothold into full control, so they deserve high priority despite remote-code-execution (RCE) bugs often getting more headlines.
Notable items include a publicly disclosed SMB EoP (CVE-2025-55234), a critical NTLM EoP (CVE-2025-54918), and high-score RCE in the HPC Pack (CVE-2025-55232, CVSS 9.8). Microsoft marked eight CVEs as more likely to be exploited and flagged one previously disclosed EoP. The company also published an audit-related CVE entry that has drawn criticism for expanding the apparent use of CVE IDs.
Key Points
- Microsoft patched 81 CVEs in September 2025; 38 are elevation-of-privilege flaws.
- CVE-2025-55234 (SMB) is publicly disclosed and can enable SMB-relay-style privilege escalation.
- CVE-2025-54918 (NTLM) is marked critical, easy to exploit and likely attractive to attackers.
- High-severity RCE to watch: CVE-2025-55232 (HPC Pack, CVSS 9.8) and CVE-2025-54916 (NTFS).
- Microsoft claims no actively exploited CVEs this month, but researchers urge rapid patching of specific EoP and RCE bugs.
- Admins should also prepare for Windows 10 end-of-life and Azure MFA Phase 2 (October), which affect patch and access strategies.
Why should I read this?
Short version: if you run Windows servers, file shares or Active Directory, this one matters. Loads of EoP bugs means an attacker with a single foothold can pivot fast. Read it so you know which patches to push first and which systems to prioritise — saves you triage time and, potentially, a nasty incident.
Author style
Punchy: the article zeroes in on the practical risk — not just CVE counts. If you’re responsible for enterprise Windows environments, the piece highlights exactly which fixes to prioritise and why they matter now.
Context and relevance
This month’s trend — EoP outnumbering other classes of bugs for a second month — signals attacker playbooks favouring privilege escalation after initial access. That raises the stakes for patch management, least-privilege controls and monitoring. The advisory also intersects with broader operational changes: Windows 10 EOL and Azure’s MFA rollout in October increase urgency for both patching and identity controls.
Source
Source: https://www.darkreading.com/application-security/eop-flaws-again-lead-microsoft-patch-day