Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.
As with every second Tuesday of the month, Windows administrators worldwide were nervously refreshing their Windows Update service. As part of the September "Patch Tuesday," Microsoft released 84 security fixes, 8 of which were rated as critical. This time, however, the bundle included two particularly nasty surprises.
Among the patched holes were two zero-day vulnerabilities, meaning they were known and potentially actively exploited by cybercriminals before Microsoft could release a fix.
The biggest stir, however, was caused by the critical vulnerability CVE-2025-54918 (CVSS 8.8) in the Windows NTLM authentication mechanism. This flaw allowed an authenticated (but low-privileged) attacker to remotely elevate their privileges to the SYSTEM level. In simpler terms: someone with basic access could easily become the lord and master of the server. It's like giving an intern the keys to the server room and the code to the safe.
This month, Microsoft also patched a range of other critical vulnerabilities in products like Microsoft Office, Windows Graphics Component, and Hyper-V, which could lead to remote code execution.
The recommendation, as always, is simple and boring, but crucial: patch your systems before cybercriminals do it for you, because unlike us, they never take a day off.
If you want to better understand the zero-day phenomenon and their global market, read our comprehensive guide to 0-day vulnerabilities.
Sources: CrowdStrike, Redmond Magazine

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
Google has released an emergency update for the Chrome browser to patch a zero-day vulnerability (CVE-2025-10585) that is already being actively exploited in the wild. Don't wait, update your browser now!

A review of the most dangerous cybersecurity vulnerabilities reported in the second week of September 2025—priority flaws concern Windows, Microsoft Office, Android, and ICS.
The Cl0p ransomware group exploited a zero-day in Oracle E-Business Suite (CVE-2025-61882), stealing data from multiple companies in August. Oracle just released a patch, but experts warn: check your systems now, as attacks continue.
Loading comments...