Microsoft’s November Patch Tuesday included 63 bug fixes which includes a zero-day patch for an actively exploited vulnerability. The tally, compared to last month’s 175, was relatively light. But leading security experts with Rapid7, SANS, Tenable, and Trend Micro this would be a bad week for patch fatigue.
Among this month’s vulnerabilities, two stand apart: a Windows Kernel zero-day (CVE-2025-62215) already exploited in the wild, and a GDI+ remote code execution flaw (CVE-2025-60724) that could give attackers SYSTEM-level access without user interaction. Both Tenable and Rapid7 rank them as immediate patching priorities.
Kernel Zero-Day: Familiar and Dangerous
The most serious issue this month, according to all four major research firms, is Windows Kernel zero-day (CVE-2025-62215), rated with a CVSS score of 9.8. This elevation-of-privilege vulnerability tied to the Windows Kernel could be used by an adversary with prior access to a targeted Windows system execute code remotely, a common step in ransomware or espionage attack chains.
“This one is likely straightforward to exploit,” wrote Johannes Ullrich, dean of research at the SANS Institute, in a Tuesday analysis. He pointed to a long history of similar kernel flaws being paired with remote code execution bugs for full takeover. Tenable’s Research Special Operations team called it “the obvious starting point” for defenders assessing what to patch first.
A 50-Year-Old Problem Still Haunts Windows
This month’s next priority is CVE-2025-60724, a critical vulnerability identified as a GDI+ heap-based buffer overflow with a CVSS score of 9.8. A GDI+ heap-based buffer overflow is a memory-corruption bug in Windows’ GDI+ graphics library where writing more data into a heap buffer than allocated can corrupt memory and lead to crashes or remote code execution.
Researchers said the bug impacts almost every Microsoft environment given the flaw resides in a Windows graphics library used by browsers, email clients, and Office applications to render images.
“Every road leads to CVE-2025-60724,” said Adam Barnett of Rapid7, describing it as an archetypal buffer overflow problem that dates back decades. The vulnerability could allow remote code execution via a crafted image file sent through a web service or document. Although not considered wormable, its ubiquity makes it a prime target for opportunistic attackers.
Office’s Perennial Problem
Elsewhere, the Microsoft Office Preview Pane once again makes an appearance in the form of CVE-2025-62199, a remote code execution bug triggered by viewing a malicious email or document. “It may be time to disable the Preview Pane entirely until Microsoft clears these bugs up,” wrote Dustin Childs of Trend Micro’s Zero Day Initiative (ZDI), noting the same attack vector has reappeared in multiple Patch Tuesday cycles.
Expert consensus splits on the severity of November updates from Microsoft. Where SANS described November as “lighter than normal” with no urgent “patch-now” emergencies, Rapid7 and ZDI flag the recurring Office and GDI+ issues as a warning not to be ignored, that user-facing applications remain among the easiest attack routes into corporate systems.
Volume Down, Risk Still Up
Despite the smaller patch count, Tenable found that nearly half of Patch Tuesday’s fixes (46%) address elevation-of-privilege vulnerabilities. These are the kind of flaws that often get overlooked because they require prior access but become critical once attackers breach a network, researchers noted. The cluster of concerned bugs this month include fixes in WinSock, CLFS, Kerberos, and several core Windows components.
“The numbers are lower, but the risk isn’t,” Tenable’s researchers warned. They emphasized that attackers frequently chain privilege escalation bugs with other exploits to move laterally or gain administrative control.
The Rise of AI in the Patch Mix
This month also marks Microsoft’s first patch explicitly referencing Agentic AI, underscoring how machine-assisted development is changing the security landscape. CVE-2025-62222, a Visual Studio Code and GitHub CoPilot flaw, could allow malicious AI-generated code to execute on developer systems.
Both ZDI and Rapid7 highlighted the patch as a sign of things to come. The bugs, both note, are not high priority, but a milestone in how quickly AI tools are entering the enterprise threat model.
A Measured Debate Over Priorities
If there’s a theme in November’s assessments, it’s caution without complacency. SANS’s Ullrich urged organizations to stay on schedule rather than panic-patch, noting that no vulnerabilities rise to the level of an emergency. “Apply these updates in accordance with your normal vulnerability management program,” he advised.
Others were less sanguine. Rapid7 warned that even flaws labeled “less likely to be exploited” can quickly become high priority once proof-of-concept code emerges — a pattern seen repeatedly this year. ZDI took a similar stance, emphasizing how preview-based Office exploits often leap from theory to real-world phishing campaigns within weeks.
Where all agree is on the top two priorities: patch the exploited Windows Kernel bug (CVE-2025-62215) immediately, and don’t wait to close the GDI+ RCE (CVE-2025-60724) exposure. From there, address Office RCEs and privilege escalations across Windows services.
Beyond Patch Counts
November’s Patch Tuesday may feel smaller, but experts say it reflects a larger trend: patching isn’t about quantity anymore. It’s about context.
“The smarter play,” Tenable’s team concluded, “isn’t chasing the loudest headlines, but prioritizing by exploitation potential.”
In other words, Patch Tuesday panic has never been less useful, while patch prioritization has never mattered more.