- August 2025 Patch Tuesday Update addresses 111 Error
- These include multiple errors in critical difficulty and a zero-day problem
- Users need to apply patchet immediately or risk attacks
Microsoft has released its August 2025 Patch Tuesday package, a cumulative set of updates that address more than 100 vulnerabilities across a variety of its products.
Among them was a well-known zero-day vulnerability in Windows Kerberos, the company’s implementation of the Kerberos approval protocol, which certainly verifies user identities in a Windows network using tickets instead of sending passwords over the network.
Kerberos was found to contain a “relative path review” error that allows an authorized threat actor to raise privileges over a network.
Critical seriousness error
In addition to zero-day, Microsoft received another 106 deficiencies, including the 13 bugs marked “Critical”.
Of them, nine errors of remote code execution (RCE) are abused in acquisition attacks, information information errors that can be used in data -exfiltration attacks, and an increase in privilege errors.
Some of the more notable vulnerabilities determined in release include a 10/10, critical error in Azure Openai, the track as CVE-2025-53767, which could allow unauthorized threat players to access sensitive information in AI environments.
Another remarkable publicity is a remote code performance error in Microsoft Graphics component that can be utilized through malicious files or images. It is tracked as CVE-2025-50165 and got a severity of 9.8/10 (critical).
There are also CVE-2025-53766, CVE-50171 and CVE-2025-53792, all of which have a severity of 9.1 and higher, making them critical.
In total, 111 vulnerabilities were addressed by Microsoft, and although no one is marked as being actively exploited in nature, administrators would be wise to use the correction without delay.
Via Bleeping computer



