Microsoft August 2025 Patch Tuesday: One Dangerous Zero-Day, 107 Flaws Fixed

Microsoft August 2025 Patch Tuesday: One Dangerous Zero-Day, 107 Flaws Fixed

User avatar placeholder
Written by Dave W. Shanahan

August 13, 2025

Microsoft’s August 2025 Patch Tuesday is one of the year’s largest security update rollouts, delivering fixes for 107 vulnerabilities across its products—including Windows, Office, Azure, SQL Server, and Exchange Server. Notably, this month addresses a critical and publicly disclosed zero-day in Windows Kerberos: CVE-2025-53779 (“BadSuccessor”), which could allow attackers to gain domain administrator privileges and compromise entire Active Directory environments. Thirteen vulnerabilities are rated “Critical,” predominantly allowing remote code execution or privilege escalation.

For system administrators and all Microsoft users, this Patch Tuesday is essential. Below, you’ll find a complete breakdown of addressed categories, links to CVE details, and actionable advice for protecting your infrastructure.


Microsoft August 2025 Patch Tuesday Breakdown

Microsoft August 2025 Patch Tuesday: One Dangerous Zero-Day, 107 Flaws Fixed

Vulnerability Categories

  • 44 Elevation of Privilege Vulnerabilities

  • 35 Remote Code Execution Vulnerabilities

  • 18 Information Disclosure Vulnerabilities

  • 4 Denial of Service Vulnerabilities

  • 9 Spoofing Vulnerabilities

These figures strictly reflect Patch Tuesday releases and do not include bugs fixed earlier in the month for Mariner, Azure, or Microsoft Edge.

The Zero-Day: CVE-2025-53779 — Windows Kerberos Elevation of Privilege

CVE-2025-53779 addresses a relative path traversal flaw in Windows Kerberos. An authenticated attacker with specific privileges can elevate themselves to domain administrator over a network. The vulnerability leverages two dMSA attributes:

  • msds-groupMSAMembership (user can utilize the dMSA)

  • msds-ManagedAccountPrecededByLink (write access lets attackers specify a user, which dMSA acts on behalf of)

Microsoft strongly advises updating all domain controllers and Kerberos-protected environments immediately to block this dangerous escalation path.

For technical details, see Akamai’s report on abusing dMSA for Active Directory privilege escalation.


Highlighted Critical Fixes

The following critical vulnerabilities stand out, with significant consequences if left unpatched:

Review full technical details for every CVE on Bleeping Computer’s August 2025 Patch Tuesday Report.


Notable Product Areas Impacted

  • Windows: Kernel, Kerberos, NTLM, Graphics, WinSock, MSMQ, Hyper-V, File Explorer, DirectX, Installer, Cloud Files, LSASS, Subsystem for Linux.

  • Microsoft Office: Word, Excel, PowerPoint, SharePoint, Visio.

  • Azure & SQL Server: File Sync, Virtual Machines, Stack, SQL Server permissions.

  • Exchange Server: Hybrid deployment, AMSI, protocol vulnerabilities.

  • Visual Studio & GitHub Copilot: RCE vulnerabilities.

  • Teams: Remote code execution flaws.

  • Web Deploy: RCE.

  • Windows Security App, PrintWorkflow, Notifications.


Guidance for IT & Admins

Immediate Steps

  • Patch All Systems Promptly: Prioritize domain controllers and Kerberos-dependent environments.

  • Review Each CVE Impact: Use official resources to match vulnerabilities to your product estate.

  • Audit for Exploited Zero-Day (Kerberos): Look for anomalous domain admin escalations since disclosure.

  • Verify Exchange and MSMQ Patch Application: These areas are popular exploitation targets.

Resources for Further Information


Broader Security Landscape

Microsoft joins other major vendors deploying security fixes this month:


Why This Patch Tuesday Matters

The scope and urgency of August 2025’s Patch Tuesday reflect the relentless evolution of security risks facing every organization today. With 107 vulnerabilities patched—including a publicly disclosed Kerberos zero-day capable of domain-wide compromise—this month’s updates signal a clear message: cyber attackers are targeting critical infrastructure with advanced privilege escalation and remote code execution techniques.

For business leaders, IT managers, and Microsoft users alike, Patch Tuesday is no longer mere routine—it’s mission-critical risk management. Proactive patching strategies must now be integrated with ongoing system monitoring, employee education, and a deep awareness of ever-changing threat vectors. Skipping updates or delaying deployment is no longer an option in a world where a single unpatched system can lead to catastrophic breaches.

It’s not just about applying fixes—it’s about building a resilient security culture from the ground up. Organizations should review every advisory, assess environmental exposure, and verify effective patching for high-value assets like Active Directory, Exchange, Azure, and endpoint clients. Leverage official security guides and technical analyses as part of continuous improvement.

Protect your networks: patch now, review privilege configurations, and stay vigilant for new advisories and threats.

Related Posts

  1. Introducing Security Agent in Power Pages: AI-Powered Website Protection Now in Public Preview
  2. Microsoft Authenticator Ends Password Support, All Users Must Now Move to Using Passkeys—PIN, Fingerprint, Facial Recognition, or Windows 11 Hello
  3. Windows 10 Celebrates its 10th Anniversary Today and Reaches End of Support by October
  4. Microsoft Finally Reveals Copilot Mode in Edge on Windows 11, Free for a Limited Time
  5. Xbox July 2025 Update: Stream Your Own Games, Cross-Device Play, Special Rewards, and PC Features Make Gaming More Flexible Than Ever

Discover more from Microsoft News Now

Subscribe to get the latest posts sent to your email.

Image placeholder

I'm Dave W. Shanahan, a Microsoft enthusiast with a passion for Windows, Xbox, Microsoft 365 Copilot, Azure, and more. I started MSFTNewsNow.com to keep the world updated on Microsoft news. Based in Massachusetts, you can email me at davewshanahan@gmail.com.