Hosted by Chris Goettl and Todd Schell
Patch Tuesday Webinar
Wednesday, May 14, 2025
Copyright © 2025 Ivanti. All rights reserved. 2
Agenda
▪ May 2025 Patch Tuesday Overview
▪ In the News
▪ Bulletins and Releases
▪ Between Patch Tuesdays
▪ Q & A
Copyright © 2025 Ivanti. All rights reserved. 3
May Patch Tuesday resolves five actively exploited and
two publicly disclosed vulnerabilities. Spoiler alert, all
five zero-days are resolved by deploying the Windows
OS update. Also, this month Windows 11 and Server
2025 updates include some new AI features, but they
carry a lot of baggage. Literally. They are around 4GB!
New AI features include Recall, Click to Do, and
Improved Windows Search.
Rounding out Patch Tuesday on the third-party side we
have a number of Adobe Creative Suite updates and
keep an eye out for the weekly Google Chrome update.
For more details check out this month's Patch Tuesday
blog.
May Patch Tuesday 2025
Copyright © 2025 Ivanti. All rights reserved. 4
In the News
Copyright © 2025 Ivanti. All rights reserved. 5
In the News
▪ Windows Zero-Day Bug Exploited for Browser-Led RCE
▪ Patch Tuesday for May: Five zero day vulnerabilities CISOs should focus on
▪ Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-
32756)
▪ Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target
Critical Infrastructure
Copyright © 2025 Ivanti. All rights reserved. 6
▪ CVE-2025-30397 Scripting Engine Memory Corruption Vulnerability
▪ CVSS 3.1 Scores: 7.5 / 7.0
▪ Severity: Important
▪ Impact: Remote code execution
▪ Affected Systems: All currently supported versions of Windows and Windows Server operating systems
▪ Per Microsoft: Successful exploitation of this vulnerability requires an attacker to first prepare the target so that it
uses Edge in Internet Explorer Mode. The user would have to click on a specially crafted URL to be
compromised by the attacker. While Microsoft has announced retirement of the Internet Explorer 11 application
on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML,
EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode
in Microsoft Edge as well as other applications through WebBrowser control.
Known Exploited Vulnerabilities
Copyright © 2025 Ivanti. All rights reserved. 7
▪ CVE-2025-30400 Microsoft DWM Core Library Elevation of Privilege Vulnerability
▪ CVSS 3.1 Scores: 7.8 / 7.2
▪ Severity: Important
▪ Impact: Elevation of Privilege
▪ Affected Systems: Windows 10, 11 and associated Windows Server operating systems
▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
▪ CVE-2025-32701 Windows Common Log File System Driver Elevation of Privilege Vulnerability
▪ CVSS 3.1 Scores: 7.8 / 7.2
▪ Severity: Important
▪ Impact: Elevation of Privilege
▪ Affected Systems: All currently supported versions of Windows and Windows Server operating systems.
▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Known Exploited Vulnerabilities (cont)
Copyright © 2025 Ivanti. All rights reserved. 8
▪ CVE-2025-32706 Windows Common Log File System Driver Elevation of Privilege Vulnerability
▪ CVSS 3.1 Scores: 7.8 / 7.2
▪ Severity: Important
▪ Impact: Elevation of Privilege
▪ Affected Systems: All currently supported versions of Windows and Windows Server operating systems.
▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
▪ CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege
Vulnerability
▪ CVSS 3.1 Scores: 7.8 / 6.8
▪ Severity: Important
▪ Impact: Elevation of Privilege
▪ Affected Systems: Windows Server 2012 and newer operating systems.
▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain administrator privileges.
Known Exploited Vulnerabilities (cont)
Copyright © 2025 Ivanti. All rights reserved. 9
▪ CVE-2025-26685 Microsoft Defender for Identity Spoofing Vulnerability
▪ CVSS 3.1 Scores: 6.5 / 5.7
▪ Severity: Important
▪ Impact: Spoofing
▪ Affected Systems: Defender for Identity
▪ Per Microsoft: No admin action is required. Customers that have NTLM completely disabled in their environment
and would like to keep the feature working, should open a support case requesting to reenable the feature. An
unauthenticated attacker with LAN access could exploit this vulnerability.
Known Publicly Disclosed Vulnerabilities
Copyright © 2025 Ivanti. All rights reserved. 10
▪ CVE-2025-32702 Visual Studio Remote Code Execution Vulnerability
▪ CVSS 3.1 Scores: 7.8 / 6.8
▪ Severity: Important
▪ Impact: Remote code execution
▪ Affected Applications: Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) and Microsoft Visual
Studio 2022 versions 17.8, 17.10, 17.12 and 17.13
▪ Per Microsoft: Improper neutralization of special elements used in a command ('command injection') in Visual
Studio allows an unauthorized attacker to execute code locally.
Known Publicly Disclosed Vulnerabilities (cont)
Copyright © 2025 Ivanti. All rights reserved. 11
May Patch Tuesday – Urgent EPMM Security Update
Ivanti EPMM has resolved two CVEs that have been exploited in an
attack chain. Ivanti recommend EPMM customers patch or apply
mitigations as soon as possible.
At the time of disclosure, we are aware of a very limited number of
customers whose solution has been exploited.
Customers who have implemented recommended API best practices have
already mitigated the exposure.
Additionally, an RPM file can be provided if customers need an alternative
option. Customers will need to open a Support Case to receive the RPM file.
Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025
(CVE-2025-4427 and CVE-2025-4428)
Copyright © 2025 Ivanti. All rights reserved. 12
Ivanti Neurons for ITSM Ivanti Cloud Services Application
Security Advisory: Ivanti
Neurons for ITSM (On-
Premises Only)
Ivanti Neurons for MDM (N-MDM)
Ivanti May Security Updates
Special thanks to the security researchers, ethical hackers, and the broader security community for partnering
with us to improve the security of our products.
Security Advisory: Ivanti
Cloud Services Application
Vulnerability:
• CVE-2025-22460 CVSS: 7.8
Affected Products:
• 5.0.4 and prior
Security Advisory: Ivanti
Neurons for MDM (N-MDM)
Vulnerability:
• CVE-2025-22462 CVSS: 9.8
Affected Versions:
• 2023.4, 2024.2 and 2024.3
NOTE: The CVSS score drops to 6.9
for customers who have implemented
Ivanti’s security guidance for their
environment. See Advisory for details.
Vulnerability:
• CVE NA CVSS: 5.4
NOTE: This vulnerability did not meet
the criteria for reserving a CVE
number. We are disclosing the fix to
ensure responsible transparency for
our customers
Affected Products:
• N-MDM R110
Copyright © 2025 Ivanti. All rights reserved. 13
CVE-2025-32433
CVSS 3: 10.0
Impact: All Linux distributions running Erlang
▪ Proof-of-concept exploit code is available for this
vulnerability
▪ Erlang/OTP is a set of libraries for the Erlang
programming language
▪ Prior to versions OTP-27.3.3, OTP-26.2.5.11,
and OTP-25.3.2.20, a SSH server may allow an
attacker to perform unauthenticated remote
code execution (RCE).
▪ By exploiting a flaw in SSH protocol message
handling, a malicious actor could gain
unauthorized access to affected systems and
execute arbitrary commands without valid
credentials.
Mitigation
This issue is patched in versions OTP-27.3.3,
OTP-26.2.5.11, and OTP-25.3.2.20. A temporary
workaround involves disabling the SSH server or to
prevent access via firewall rules.
New and Notable Linux Vulnerabilities: 1
Highlighted by TuxCare
Copyright © 2025 Ivanti. All rights reserved. 14
CVE-2025-29927
CVSS 3: 9.8
Impact: All Linux distributions running Next.js
▪ Next.js is a popular React-based web framework.
▪ This critical vulnerability affects versions prior to
12.3.5, 13.5.9, 14.2.25, and 15.2.3. It stems from
improper trust of the x-middleware-subrequest
header, which is meant to prevent infinite
middleware loops.
▪ By spoofing this header, attackers can bypass
middleware logic entirely including authentication
and authorization mechanisms thereby gaining
unauthorized access to protected routes in
vulnerable applications.
▪ An attacker can upload a fake session
persistence file, which Tomcat will accept, and
trick Tomcat to then use this file as a real
session file.
Mitigation
If patching to a safe version is infeasible, it is
recommended that you prevent external user
requests which contain the x-middleware-
subrequest header from reaching your Next.js
application.
New and Notable Linux Vulnerabilities: 2
Highlighted by TuxCare
Copyright © 2025 Ivanti. All rights reserved. 15
CVE-2025-24813
CVSS 3: 9.8
Impact: All Linux distributions running Tomcat
▪ A flaw was found in Apache Tomcat.
▪ In certain conditions and configurations, this
vulnerability allows a remote attacker to exploit a
path equivalence flaw to view file system
contents and add malicious content via a write-
enabled Default Servlet in Apache Tomcat.
▪ Vulnerability details and proof-of-concept (PoC)
exploit code are both publicly available.
▪ This issue affects Apache Tomcat: from 11.0.0-
M1 through 11.0.2, from 10.1.0-M1 through
10.1.34, from 9.0.0.M1 through 9.0.98.
Mitigation
Upgrade to versions 11.0.3, 10.1.35 or 9.0.99, which
fix the issue.
New and Notable Linux Vulnerabilities: 3
Highlighted by TuxCare
Copyright © 2025 Ivanti. All rights reserved. 16
Microsoft Patch Tuesday Updates of Interest
Advisory 990001 Latest Servicing Stack Updates (SSU)
▪ https://msrc.microsoft.com/update-guide/en-
US/vulnerability/ADV990001
▪ Advisory is not updated BUT:
▪ Windows Server 2012 / 2012 R2
▪ Windows 10 Version 1507
▪ Windows 10 Version 1607 and Server 2016
Azure and Development Tool Updates
▪ .NET 8.0 for Windows/Mac/Linux
▪ .NET 9.0 for Windows/Mac/Linux
▪ Azure File Sync v19.0 and v20.0
▪ Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
▪ Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
▪ Microsoft Visual Studio 2022 versions 17.8, 17.10, 17.12 and 17.13
Copyright © 2025 Ivanti. All rights reserved. 17
Windows 10
and 11 Lifecycle
Awareness
Windows 10 Enterprise and Education
Version Release Date End of Support Date
22H2 10/18/2022 10/14/2025
Windows 10 Home and Pro
Version Release Date End of Support Date
22H2 10/18/2022 10/14/2025
Windows 11 Home and Pro
Version Release Date End of Support Date
24H2 10/1/2024 10/13/2026
23H2 10/31/2023 11/11/2025
Windows 11 Enterprise and Education
Version Release Date End of Support Date
24H2 10/1/2024 10/12/2027
23H2 10/31/2023 11/10/2026
22H2 9/20/2022 10/14/2025
Source: Microsoft
https://docs.microsoft.com/en-us/lifecycle/faq/windows
Copyright © 2025 Ivanti. All rights reserved. 18
Microsoft Support Ivanti Support
Windows 10 22H2 reaches EOS Oct 2025
Three years of ESU support
• Year 1 October 15, 2025 – October 13, 2026
• Year 2 October 14, 2026 – October 12, 2027
• Year 3 October 13, 2027 – October 10, 2028
Licensing and Pricing
• Full-year purchase only
• Price doubles each year
• Cloud-based licensing via Windows 365 and
Intune
• 5 by 5 licensing via manual key download
Windows 10 Extended Security Updates (ESU)
ESU support based on Microsoft releases
Available for three major patch products
• Neurons for Patch Management
• Endpoint Manager
• Security Controls
Familiar model
• Concurrent with Microsoft support years
• Offered as special content
• Requires signed EULA addendum
• Tiered pricing based on required endpoints
• Fixed price throughout life of program
Copyright © 2025 Ivanti. All rights reserved. 19
Server Long-term Servicing Channel Support
Server LTSC Support
Version Editions Release Date Mainstream Support Ends Extended Support Ends
Windows Server 2025 Datacenter and Standard 11/01/2024 10/09/2029 10/10/2034
Windows Server 2022 Datacenter and Standard 08/18/2021 10/13/2026 10/14/2031
Windows Server 2019
(Version 1809)
Datacenter and Standard 11/13/2018 01/09/2024 01/09/2029
Windows Server 2016
(Version 1607)
Datacenter, Essentials, and Standard 10/15/2016 01/11/2022 01/11/2027
https://learn.microsoft.com/en-us/windows-server/get-started/windows-server-release-info
▪ Focused on server long-term stability
▪ Major version releases every 2-3 years
▪ 5 years mainstream and 5 years extended support
▪ Server core or server with desktop experience available
Source: Microsoft
Copyright © 2025 Ivanti. All rights reserved. 20
Patch Content Announcements
Announcements Posted on Community Forum Pages
▪ https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2
▪ Subscribe to receive email for the desired product(s)
Content Info: Endpoint Security
Content Info: Endpoint Manager
Content Info: macOS Updates
Content Info: Linux Updates
Content Info: Patch for Configuration Manager
Content Info: ISEC and Neurons Patch
Content Info: Neurons Patch for InTune
Copyright © 2025 Ivanti. All rights reserved. 21
Bulletins and Releases
Copyright © 2025 Ivanti. All rights reserved.
APSB25-42: Security Update for Adobe Animate
▪ Maximum Severity: Critical
▪ Affected Products: Adobe Animate version 2023 and 2024
▪ Description: Adobe has released an update for Adobe Animate. This update resolves 5
vulnerabilities – 4 rated Critical and 1 rated Important. See
https://helpx.adobe.com/security/products/animate/apsb25-42.html for more details. Adobe is not
aware of any exploits in the wild for any of the issues addressed in these updates.
▪ Impact: Arbitrary Code Execution, Denial of Service
▪ Fixes 5 Vulnerabilities: CVE-2025-30328, CVE-2025-43555, CVE-2025-43556, CVE-2025-
43557, CVE-2025-30329
▪ Restart Required: Requires application restart
1
Copyright © 2025 Ivanti. All rights reserved.
APSB25-44: Security Update for Adobe Bridge
▪ Maximum Severity: Critical
▪ Affected Products: Adobe Bridge versions 14 and 15
▪ Description: Adobe has released a security update for Adobe Bridge for Windows and
macOS. This update resolves 3 Critical rated vulnerabilities. See
https://helpx.adobe.com/security/products/bridge/apsb25-44.html for more details. Adobe is not
aware of any exploits in the wild for any of the issues addressed in these updates.
▪ Impact: Arbitrary Code Execution
▪ Fixes 3 Vulnerabilities: CVE-2025-43545, CVE-2025-43546, CVE-2025-43547
▪ Restart Required: Requires application restart
1
Copyright © 2025 Ivanti. All rights reserved.
APSB25-11: Security Update for Adobe Illustrator
▪ Maximum Severity: Critical
▪ Affected Products: Adobe Illustrator 2024 and Illustrator 2025
▪ Description: Adobe has released an update for Adobe Illustrator. This update resolves 1 critical
vulnerability. See https://helpx.adobe.com/security/products/illustrator/apsb25-43.html for more
details.
▪ Impact: Arbitrary Code Execution
▪ Fixes 1 Vulnerability: CVE-2025-30330
▪ Restart Required: Requires application restart
1
Copyright © 2025 Ivanti. All rights reserved.
APSB25-37: Security Update for Adobe InDesign
▪ Maximum Severity: Critical
▪ Affected Products: Adobe InDesign 19 and InDesign 20
▪ Description: Adobe has released an update for Adobe InDesign. This update resolves 1 critical
and 2 important vulnerabilities. See https://helpx.adobe.com/security/products/indesign/apsb25-
37.html for more details.
▪ Impact: Arbitrary Code Execution, Denial of Service
▪ Fixes 3 Vulnerabilities: CVE-2025-30318, CVE-2025-30319, CVE-2025-30320
▪ Restart Required: Requires application restart
1
Copyright © 2025 Ivanti. All rights reserved.
APSB25-40: Security Update for Adobe Photoshop
▪ Maximum Severity: Critical
▪ Affected Products: Adobe Photoshop versions 2024 and 2025
▪ Description: Adobe has released an update for Adobe Photoshop for Windows and macOS. This
update addresses 3 vulnerabilities rated Critical. See
https://helpx.adobe.com/security/products/photoshop/apsb25-40.html for more details. Adobe is
not aware of any exploits in the wild for any of the issues addressed in these updates.
▪ Impact: Arbitrary Code Execution
▪ Fixes 3 Vulnerabilities: CVE-2025-30324, CVE-2025-30325, CVE-2025-30326
▪ Restart Required: Requires application restart
1
Copyright © 2025 Ivanti. All rights reserved. 27
MS25-05-W11: Windows 11 Update
▪ Maximum Severity: Critical
▪ Affected Products: Microsoft Windows 11 Version 22H2, 23H2, 24H2, Server 2025 and Edge
Chromium
▪ Description: This bulletin references KB 5058405 (22H2/23H2), and KB 5058411 (24H2 and
Server 2025). See KBs for details of all changes.
▪ Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of
Privilege, and Information Disclosure
▪ Fixes 41 Vulnerabilities: CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-
32706, and CVE-2025-32709 are known exploited. No CVEs are publicly disclosed. See the
Security Update Guide for the complete list of CVEs.
▪ Restart Required: Requires restart
▪ Known Issues: None reported
1
Copyright © 2025 Ivanti. All rights reserved. 28
MS25-05-W10: Windows 10 Update
▪ Maximum Severity: Critical
▪ Affected Products: Microsoft Windows 10 Versions 1607, 1809, 22H2, Server 2016, Server
2019, Server 2022, Server 2022 Datacenter: Azure Edition and Edge Chromium
▪ Description: This bulletin references multiple KB articles. See Windows 10 and associated
server KBs for details of all changes.
▪ Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of
Privilege, and Information Disclosure
▪ Fixes 41 Vulnerabilities: CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-
32706, and CVE-2025-32709 are known exploited. No CVEs are publicly disclosed. See the
Security Update Guide for the complete list of CVEs.
▪ Restart Required: Requires restart
▪ Known Issues: See next slide
1
Copyright © 2025 Ivanti. All rights reserved. 29
May Known Issues for Windows 10
▪ KB 5058392 - Win 10 Enterprise LTSC 2019, Win 10 IoT Enterprise LTSC 2019, Windows 10
IoT Core LTSC, Windows Server 2019
▪ [Citrix_SRA] Devices that have certain Citrix components installed might be unable to
complete installation of the January 2025 Windows security update. This has been noted
with the Citrix Session Recording Agent installed.
▪ Workaround: Citrix has provided several workaround options until they resolve the issue
with Microsoft. See KB for details.
▪ KB 5058379 – Windows 10 Enterprise LTSC 2021, Windows 10 IoT Enterprise LTSC 2021,
Windows 10, version 22H2, all editions
▪ [Citrix_SRA]
Copyright © 2025 Ivanti. All rights reserved. 30
▪ Maximum Severity: Critical
▪ Affected Products: Excel 2016, Office 2016, Office LTSC for Mac 2021 & 2024, Office Online
Server, Office for Android, Office Universal, Outlook for Android
▪ Description: This security update addresses 11 vulnerabilities in Microsoft Office and supporting
products. This bulletin is based on 5 KB articles plus release notes for the Mac updates.
▪ Impact: Remote Code Execution
▪ Fixes 11 Vulnerabilities: No vulnerabilities are reported known exploited or publicly disclosed.
See the Security Update Guide for the complete list of CVEs.
▪ Restart Required: Requires application restart
▪ Known Issues: None reported
MS25-05-OFF: Security Updates for Microsoft Office
1
Copyright © 2025 Ivanti. All rights reserved. 31
▪ Maximum Severity: Critical
▪ Affected Products: Microsoft 365 Apps, Office 2019, Office LTSC 2021 and Office LTSC 2024
▪ Description: This security update addresses several vulnerabilities in Microsoft Office.
Information on the security updates is available at https://learn.microsoft.com/en-
us/officeupdates/microsoft365-apps-security-updates.
▪ Impact: Remote Code Execution
▪ Fixes 13 Vulnerabilities: No vulnerabilities are reported known exploited or publicly disclosed.
See the Security Update Guide for the complete list of CVEs
▪ Restart Required: Requires application restart
▪ Known Issues: None reported
MS25-05-O365: Security Updates for Microsoft 365 Apps
1
Copyright © 2025 Ivanti. All rights reserved. 32
▪ Maximum Severity: Important
▪ Affected Products: Microsoft SharePoint Server Subscription Edition, SharePoint Enterprise
Server 2016, and SharePoint Server 2019
▪ Description: This security update resolves 4 remote code execution and elevation of privilege
vulnerabilities in Microsoft SharePoint Server. This bulletin is based on 5 KB articles.
▪ Impact: Remote Code Execution, Elevation of Privilege
▪ Fixes 4 Vulnerabilities: CVE-2025-29971, CVE-2025-30378, CVE-2025-30382, and CVE-2025-
30384. No CVEs are reported known exploited or publicly disclosed.
▪ Restart Required: Requires application restart
▪ Known Issues: None reported
MS25-05-SPT: Security Updates for Sharepoint Server
1
2
Copyright © 2025 Ivanti. All rights reserved. 33
Between
Patch Tuesdays
Copyright © 2025 Ivanti. All rights reserved. 34
Windows Release Summary
▪ Security Updates (with CVEs): Google Chrome (3), Corretto (3), Firefox (2), Firefox ESR (1), Jabra Direct
(1), Java 8 (1), Java Development Kit 11 (1), Java Development Kit 17 (1), Java Development Kit 21 (1),
VirtualBox (1), Python (1), Thunderbird ESR (2)
▪ Security Updates (w/o CVEs): Adobe After Effects (1), Adobe Illustrator (1), Adobe Photoshop (2), Adobe
Acrobat DC and Acrobat Reader DC (2), Amazon WorkSpaces (1), Apache Tomcat (1), Azul Zulu (4),
CCleaner (1), Cisco Webex Meetings Desktop App (1), Cisco Jabber (1), Google Chrome (1), Corretto 8 (1),
Falcon Sensor for Windows (1), Devolutions Remote Desktop Manager (4), Docker For Windows (3),
Dropbox (2), Eclipse Adoptium (4), Firefox (1), FileZilla Client (1), Foxit PDF Editor (1), Foxit PDF Editor
(Subscription) (1), Foxit PDF Reader Consumer (1), Foxit PDF Reader Enterprise (1). Grammarly for
Windows (4), LibreOffice (2), Node.JS (LTS Upper) (2), Notepad++ (2), NextCloud Desktop Client (2), Opera
(3), PDF24 Creator (1), PDF-Xchange PRO (1), PDF-Xchange Editor Plus (1), Plex Media Server (1), PeaZip
(1), RedHat OpenJDK (4), Skype (1), Slack Machine-Wide Installer (2), Snagit (1), Splunk Universal
Forwarder (3), Tableau Desktop (4), Ultra Edit (1), UltraVNC (2), VirtualBox (1), VSCodium (4), WinSCP (1),
Wireshark (1), Zoom Workplace (2), Zoom Outlook Plugin (1), Zoom Rooms (1), Zoom Workplace VDI (1)
Copyright © 2025 Ivanti. All rights reserved. 35
Windows Release Summary
▪ Non-Security Updates: 1Password (3), AIMP (3), Beyond Compare (1), Bitwarden (1), Camtasia (2),
CyberDuck (1), draw.io (2), Evernote (4), Google Drive File Stream (1), GeoGebra Classic (4), GoTo Connect
(1), OpenVPN Connect (1), PicPick (1), R for Windows (1), RingCentral App (Machine-Wide Installer) (2),
Rocket.Chat Desktop Client (1), TortoiseHg (1), Wazuh Agent (1), Cisco Webex Teams (1), WinMerge (2)
Copyright © 2025 Ivanti. All rights reserved. 36
Windows Third Party CVE Information
▪ Google Chrome 135.0.7049.96
▪ CHROME-250415, QGC1350704996
▪ Fixes 2 Vulnerabilities: CVE-2025-3619, CVE-2025-3620
▪ Google Chrome 136.0.7103.49
▪ CHROME-250429, QGC1360710349
▪ Fixes 4 Vulnerabilities: CVE-2025-4050, CVE-2025-4051, CVE-2025-4052, CVE-2025-4096
▪ Google Chrome 136.0.7103.93
▪ CHROME-250506, QGC1360710393
▪ Fixes 1 Vulnerability: CVE-2025-4372
▪ Jabra Direct 6.22.11401
▪ JABRA-250429, QJD62211401
▪ Fixes 1 Vulnerability: CVE-2025-2783
Copyright © 2025 Ivanti. All rights reserved. 37
Windows Third Party CVE Information (cont)
▪ Firefox 137.0.2
▪ FF-250415, QFF13702
▪ Fixes 1 Vulnerability: CVE-2025-3608
▪ Firefox 138.0
▪ FF-250429, QFF1380
▪ Fixes 11 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085,
CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-2025-
4091, CVE-2025-4092
▪ Firefox ESR 128.10.0
▪ FFE128-250429, QFFE128100
▪ Fixes 7 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4084, CVE-
2025-4087, CVE-2025-4091, CVE-2025-4093
Copyright © 2025 Ivanti. All rights reserved. 38
Windows Third Party CVE Information (cont)
▪ Java Development Kit 21 Update 21.0.6
▪ JDK21-250416, QJDK2106
▪ Fixes 4 Vulnerabilities: CVE-2025-21587, CVE-2025-23083. CVE-2025-30691, CVE-2025-30698
▪ Java Development Kit 17 Update 17.0.15
▪ JDK17-250416, QJDK17015
▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-23083, CVE-2025-30698
▪ Java Development Kit 11 Update 11.0.27
▪ JDK11-250416, QJDK11027
▪ Fixes 2 Vulnerabilities: CVE-2025-21587, CVE-2025-30698
▪ Java 8 Update 451 – JRE and JDK
▪ JAVA8-250416, QJDK8U451 and QJRE8U451
▪ Fixes 4 Vulnerabilities: CVE-2024-47606, CVE-2024-54534, CVE-2025-21587, CVE-2025-30698
Copyright © 2025 Ivanti. All rights reserved. 39
Windows Third Party CVE Information (cont)
▪ Corretto 21.0.7.6.1
▪ CRTO21-250416, QCRTOJDK2107
▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-30691, CVE-2025-30698
▪ Corretto 17.0.15.6.1
▪ CRTO17-250416, QCRTOJDK17015
▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-30691, CVE-2025-30698
▪ Corretto 11.0.27.6.1
▪ CRTO11-250416, QCRTOJDK11027
▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-30691, CVE-2025-30698
Copyright © 2025 Ivanti. All rights reserved. 40
Windows Third Party CVE Information (cont)
▪ Omnissa Horizon Client 8.15.0
▪ OMHC-250416, QOMHC8150
▪ Fixes 1 Vulnerability: CVE-2023-25230
▪ VirtualBox 7.1.8
▪ OVB71-250416, QOVB718
▪ Fixes 3 Vulnerabilities: CVE-2025-30712, CVE-2025-30719, CVE-2025-30725
▪ Python 3.13.3
▪ PYTHN313-250415, QPYTH3133
▪ Fixes 5 Vulnerabilities: CVE-2023-27043, CVE-2023-40217, CVE-2023-52425, CVE-2024-
11168, CVE-2024-4030
▪ Thunderbird 128.9.2
▪ TB-250416, QTB12892
▪ Fixes 3 Vulnerabilities: CVE-2025-2830, CVE-2025-3522, CVE-2025-3523
Copyright © 2025 Ivanti. All rights reserved. 41
Windows Third Party CVE Information (cont)
▪ Thunderbird 128.10.0
▪ TB-250429, QTB128100
▪ Fixes 10 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085,
CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-
2025-4091, CVE-2025-4092
Copyright © 2025 Ivanti. All rights reserved. 42
Apple Release Summary
▪ Security Updates (with CVEs): Adobe Bridge (1), Adobe Premiere Pro (2), Apple macOS
Sequoia (2), Apple macOS Sonoma (1), Apple macOS Ventura (1), Apple Safari (1), Google
Chrome (3), Docker Desktop (1), Microsoft Office Excel (1), Firefox (2), Firefox ESR (2),
Microsoft Edge (3), Microsoft Office OneNote (1), Microsoft Office Outlook (1), Microsoft Office
PowerPoint (1), Thunderbird (2), Thunderbird ESR (2), Microsoft Office Word (1)
▪ Security Updates (w/o CVEs): Google Chrome (1), Zoom Client (1)
▪ Non-Security Updates: 1Password (2), Alfred (1), Adobe Photoshop (2), Adobe Acrobat DC
and Acrobat Reader DC (1), Asana (1), Brave (4), Cyberduck (1), Devolutions Remote Desktop
Manager (3), Docker Desktop (2), draw.io (2), Evernote (4), Microsoft Office Excel (1), Figma
(2), Google Drive (1), Go (2), Grammarly (4), Krisp (1), LibreOffice (1), Microsoft AutoUpdate
(1), Microsoft Edge (2), Obsidian (1), OneDrive (1), OpenVPN Connect (1), Microsoft Office
Outlook (2), PyCharm Professional (1), Microsoft Office PowerPoint (1), Skype (1), Slack (2),
Spotify (2), Microsoft Teams (1), Visual Studio Code (3), VSCodium (5), Webex Teams (1),
Microsoft Office Word (2), Zoom Client (1)
Copyright © 2025 Ivanti. All rights reserved. 43
Apple Updates with CVE Information
▪ macOS Ventura 13.7.6
▪ Fixes 30 Vulnerabilities: See Apple security bulletin for details
▪ macOS Sonoma 14.7.6
▪ Fixes 33 Vulnerabilities: See Apple security bulletin for details
▪ macOS Sequoia 15.5
▪ Fixes 50 Vulnerabilities: See Apple security bulletin for details
▪ macOS Sequoia 15.4.1
▪ Fixes 2 Vulnerabilities: See Apple security bulletin for details
▪ Safari 18.5
▪ Fixes 10 Vulnerabilities: See Apple security bulletin for details
Copyright © 2025 Ivanti. All rights reserved. 44
Apple Third Party CVE Information
▪ Adobe Bridge 2025 (15.0.4)
▪ KBRG2025MAC-250508
▪ Fixes 1 Vulnerability: CVE-2025-27193
▪ Adobe Premiere Pro 2024 (24.6.5)
▪ PPRO2024MAC-250425
▪ Fixes 1 Vulnerability: CVE-2025-27196
▪ Adobe Premiere Pro 2025 (25.2.3)
▪ PPRO2025MAC-250425
▪ Fixes 1 Vulnerability: CVE-2025-27196
▪ Docker Desktop 4.41.0
▪ DOCKERMAC-250428
▪ Fixes 1 Vulnerability: CVE-2025-3224
Copyright © 2025 Ivanti. All rights reserved. 45
Apple Third Party CVE Information (cont)
▪ Google Chrome 135.0.7049.96
▪ CHROMEMAC-250416
▪ Fixes 2 Vulnerabilities: CVE-2025-3619, CVE-2025-3620
▪ Google Chrome 136.0.7103.49
▪ CHROMEMAC-250429
▪ Fixes 4 Vulnerabilities: CVE-2025-4050, CVE-2025-4051, CVE-2025-4052, CVE-2025-4096
▪ Google Chrome 136.0.7103.93
▪ CHROMEMAC-250506
▪ Fixes 1 Vulnerability: CVE-2025-4372
▪ Firefox 137.0.2
▪ MFSA2025-25
▪ Fixes 1 Vulnerability: CVE-2025-3608
Copyright © 2025 Ivanti. All rights reserved. 46
Apple Third Party CVE Information (cont)
▪ Firefox 138.0
▪ FF-250429
▪ Fixes 11 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085,
CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-2025-
4091, CVE-2025-4092
▪ Firefox ESR 115.23.0
▪ FFE115-250502
▪ Fixes 4 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4084
▪ Firefox ESR 128.10.0
▪ FFE128-250429
▪ Fixes 7 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4084, CVE-
2025-4087, CVE-2025-4091, CVE-2025-4093
Copyright © 2025 Ivanti. All rights reserved. 47
Apple Third Party CVE Information (cont)
▪ Microsoft Edge 135.0.3179.73
▪ MEDGEMAC-250411
▪ Fixes 1 Vulnerability: CVE-2025-3066
▪ Microsoft Edge 135.0.3179.85
▪ MEDGEMAC-250417
▪ Fixes 2 Vulnerabilities: CVE-2025-3619, CVE-2025-3620
▪ Microsoft Edge 136.0.3240.50
▪ MEDGEMAC-250502
▪ Fixes 4 Vulnerabilities: CVE-2025-4050, CVE-2025-4051, CVE-2025-4052, CVE-2025-4096
Copyright © 2025 Ivanti. All rights reserved. 48
Apple Third Party CVE Information (cont)
▪ Microsoft Office Excel 16.96
▪ EXCEL-250416
▪ Fixes 10 Vulnerabilities: CVE-2025-26642, CVE-2025-27745, CVE-2025-27746, CVE-2025-27748,
CVE-2025-27749, CVE-2025-27750, CVE-2025-27751, CVE-2025-27752, CVE-2025-29791,
CVE-2025-29816
▪ Microsoft Office OneNote 16.96
▪ ONENOTE-250416
▪ Fixes 8 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749,
CVE-2025-27752, CVE-2025-29791, CVE-2025-29816, CVE-2025-29822
▪ Microsoft Office Outlook 16.96
▪ OUTLOOK-250416
▪ Fixes 7 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749,
CVE-2025-27752, CVE-2025-29791, CVE-2025-29816
Copyright © 2025 Ivanti. All rights reserved. 49
Apple Third Party CVE Information (cont)
▪ Microsoft Office Powerpoint 16.96
▪ POWERPOINT-250416
▪ Fixes 7 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749,
CVE-2025-27752, CVE-2025-29791, CVE-2025-29816
▪ Microsoft Office Word 16.96
▪ WORD-250416
▪ Fixes 9 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27747, CVE-2025-27748,
CVE-2025-27749, CVE-2025-27752, CVE-2025-29791, CVE-2025-29816, CVE-2025-29820
▪ Thunderbird 137.0.2
▪ MFSA2025-26
▪ Fixes 1 Vulnerability: CVE-2025-3608
Copyright © 2025 Ivanti. All rights reserved. 50
Apple Third Party CVE Information (cont)
▪ Thunderbird 138.0
▪ TB-250502
▪ Fixes 11 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085,
CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-
2025-4091, CVE-2025-4092
▪ Thunderbird ESR 128.9.2
▪ TBE128-250416
▪ Fixes 3 Vulnerabilities: CVE-2025-2830, CVE-2025-3522, CVE-2025-3523
▪ Thunderbird ESR 128.10.0
▪ TBE-250429
▪ Fixes 10 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085,
CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-
2025-4091, CVE-2025-4092
Copyright © 2025 Ivanti. All rights reserved. 51
Q & A
Copyright © 2025 Ivanti. All rights reserved.
Copyright © 2025 Ivanti. All rights reserved. 52
Thank You!

May Patch Tuesday

  • 1.
    Hosted by ChrisGoettl and Todd Schell Patch Tuesday Webinar Wednesday, May 14, 2025
  • 2.
    Copyright © 2025Ivanti. All rights reserved. 2 Agenda ▪ May 2025 Patch Tuesday Overview ▪ In the News ▪ Bulletins and Releases ▪ Between Patch Tuesdays ▪ Q & A
  • 3.
    Copyright © 2025Ivanti. All rights reserved. 3 May Patch Tuesday resolves five actively exploited and two publicly disclosed vulnerabilities. Spoiler alert, all five zero-days are resolved by deploying the Windows OS update. Also, this month Windows 11 and Server 2025 updates include some new AI features, but they carry a lot of baggage. Literally. They are around 4GB! New AI features include Recall, Click to Do, and Improved Windows Search. Rounding out Patch Tuesday on the third-party side we have a number of Adobe Creative Suite updates and keep an eye out for the weekly Google Chrome update. For more details check out this month's Patch Tuesday blog. May Patch Tuesday 2025
  • 4.
    Copyright © 2025Ivanti. All rights reserved. 4 In the News
  • 5.
    Copyright © 2025Ivanti. All rights reserved. 5 In the News ▪ Windows Zero-Day Bug Exploited for Browser-Led RCE ▪ Patch Tuesday for May: Five zero day vulnerabilities CISOs should focus on ▪ Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025- 32756) ▪ Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure
  • 6.
    Copyright © 2025Ivanti. All rights reserved. 6 ▪ CVE-2025-30397 Scripting Engine Memory Corruption Vulnerability ▪ CVSS 3.1 Scores: 7.5 / 7.0 ▪ Severity: Important ▪ Impact: Remote code execution ▪ Affected Systems: All currently supported versions of Windows and Windows Server operating systems ▪ Per Microsoft: Successful exploitation of this vulnerability requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode. The user would have to click on a specially crafted URL to be compromised by the attacker. While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. Known Exploited Vulnerabilities
  • 7.
    Copyright © 2025Ivanti. All rights reserved. 7 ▪ CVE-2025-30400 Microsoft DWM Core Library Elevation of Privilege Vulnerability ▪ CVSS 3.1 Scores: 7.8 / 7.2 ▪ Severity: Important ▪ Impact: Elevation of Privilege ▪ Affected Systems: Windows 10, 11 and associated Windows Server operating systems ▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. ▪ CVE-2025-32701 Windows Common Log File System Driver Elevation of Privilege Vulnerability ▪ CVSS 3.1 Scores: 7.8 / 7.2 ▪ Severity: Important ▪ Impact: Elevation of Privilege ▪ Affected Systems: All currently supported versions of Windows and Windows Server operating systems. ▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Known Exploited Vulnerabilities (cont)
  • 8.
    Copyright © 2025Ivanti. All rights reserved. 8 ▪ CVE-2025-32706 Windows Common Log File System Driver Elevation of Privilege Vulnerability ▪ CVSS 3.1 Scores: 7.8 / 7.2 ▪ Severity: Important ▪ Impact: Elevation of Privilege ▪ Affected Systems: All currently supported versions of Windows and Windows Server operating systems. ▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. ▪ CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability ▪ CVSS 3.1 Scores: 7.8 / 6.8 ▪ Severity: Important ▪ Impact: Elevation of Privilege ▪ Affected Systems: Windows Server 2012 and newer operating systems. ▪ Per Microsoft: An attacker who successfully exploited this vulnerability could gain administrator privileges. Known Exploited Vulnerabilities (cont)
  • 9.
    Copyright © 2025Ivanti. All rights reserved. 9 ▪ CVE-2025-26685 Microsoft Defender for Identity Spoofing Vulnerability ▪ CVSS 3.1 Scores: 6.5 / 5.7 ▪ Severity: Important ▪ Impact: Spoofing ▪ Affected Systems: Defender for Identity ▪ Per Microsoft: No admin action is required. Customers that have NTLM completely disabled in their environment and would like to keep the feature working, should open a support case requesting to reenable the feature. An unauthenticated attacker with LAN access could exploit this vulnerability. Known Publicly Disclosed Vulnerabilities
  • 10.
    Copyright © 2025Ivanti. All rights reserved. 10 ▪ CVE-2025-32702 Visual Studio Remote Code Execution Vulnerability ▪ CVSS 3.1 Scores: 7.8 / 6.8 ▪ Severity: Important ▪ Impact: Remote code execution ▪ Affected Applications: Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) and Microsoft Visual Studio 2022 versions 17.8, 17.10, 17.12 and 17.13 ▪ Per Microsoft: Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally. Known Publicly Disclosed Vulnerabilities (cont)
  • 11.
    Copyright © 2025Ivanti. All rights reserved. 11 May Patch Tuesday – Urgent EPMM Security Update Ivanti EPMM has resolved two CVEs that have been exploited in an attack chain. Ivanti recommend EPMM customers patch or apply mitigations as soon as possible. At the time of disclosure, we are aware of a very limited number of customers whose solution has been exploited. Customers who have implemented recommended API best practices have already mitigated the exposure. Additionally, an RPM file can be provided if customers need an alternative option. Customers will need to open a Support Case to receive the RPM file. Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428)
  • 12.
    Copyright © 2025Ivanti. All rights reserved. 12 Ivanti Neurons for ITSM Ivanti Cloud Services Application Security Advisory: Ivanti Neurons for ITSM (On- Premises Only) Ivanti Neurons for MDM (N-MDM) Ivanti May Security Updates Special thanks to the security researchers, ethical hackers, and the broader security community for partnering with us to improve the security of our products. Security Advisory: Ivanti Cloud Services Application Vulnerability: • CVE-2025-22460 CVSS: 7.8 Affected Products: • 5.0.4 and prior Security Advisory: Ivanti Neurons for MDM (N-MDM) Vulnerability: • CVE-2025-22462 CVSS: 9.8 Affected Versions: • 2023.4, 2024.2 and 2024.3 NOTE: The CVSS score drops to 6.9 for customers who have implemented Ivanti’s security guidance for their environment. See Advisory for details. Vulnerability: • CVE NA CVSS: 5.4 NOTE: This vulnerability did not meet the criteria for reserving a CVE number. We are disclosing the fix to ensure responsible transparency for our customers Affected Products: • N-MDM R110
  • 13.
    Copyright © 2025Ivanti. All rights reserved. 13 CVE-2025-32433 CVSS 3: 10.0 Impact: All Linux distributions running Erlang ▪ Proof-of-concept exploit code is available for this vulnerability ▪ Erlang/OTP is a set of libraries for the Erlang programming language ▪ Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). ▪ By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. Mitigation This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules. New and Notable Linux Vulnerabilities: 1 Highlighted by TuxCare
  • 14.
    Copyright © 2025Ivanti. All rights reserved. 14 CVE-2025-29927 CVSS 3: 9.8 Impact: All Linux distributions running Next.js ▪ Next.js is a popular React-based web framework. ▪ This critical vulnerability affects versions prior to 12.3.5, 13.5.9, 14.2.25, and 15.2.3. It stems from improper trust of the x-middleware-subrequest header, which is meant to prevent infinite middleware loops. ▪ By spoofing this header, attackers can bypass middleware logic entirely including authentication and authorization mechanisms thereby gaining unauthorized access to protected routes in vulnerable applications. ▪ An attacker can upload a fake session persistence file, which Tomcat will accept, and trick Tomcat to then use this file as a real session file. Mitigation If patching to a safe version is infeasible, it is recommended that you prevent external user requests which contain the x-middleware- subrequest header from reaching your Next.js application. New and Notable Linux Vulnerabilities: 2 Highlighted by TuxCare
  • 15.
    Copyright © 2025Ivanti. All rights reserved. 15 CVE-2025-24813 CVSS 3: 9.8 Impact: All Linux distributions running Tomcat ▪ A flaw was found in Apache Tomcat. ▪ In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write- enabled Default Servlet in Apache Tomcat. ▪ Vulnerability details and proof-of-concept (PoC) exploit code are both publicly available. ▪ This issue affects Apache Tomcat: from 11.0.0- M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. Mitigation Upgrade to versions 11.0.3, 10.1.35 or 9.0.99, which fix the issue. New and Notable Linux Vulnerabilities: 3 Highlighted by TuxCare
  • 16.
    Copyright © 2025Ivanti. All rights reserved. 16 Microsoft Patch Tuesday Updates of Interest Advisory 990001 Latest Servicing Stack Updates (SSU) ▪ https://msrc.microsoft.com/update-guide/en- US/vulnerability/ADV990001 ▪ Advisory is not updated BUT: ▪ Windows Server 2012 / 2012 R2 ▪ Windows 10 Version 1507 ▪ Windows 10 Version 1607 and Server 2016 Azure and Development Tool Updates ▪ .NET 8.0 for Windows/Mac/Linux ▪ .NET 9.0 for Windows/Mac/Linux ▪ Azure File Sync v19.0 and v20.0 ▪ Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) ▪ Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) ▪ Microsoft Visual Studio 2022 versions 17.8, 17.10, 17.12 and 17.13
  • 17.
    Copyright © 2025Ivanti. All rights reserved. 17 Windows 10 and 11 Lifecycle Awareness Windows 10 Enterprise and Education Version Release Date End of Support Date 22H2 10/18/2022 10/14/2025 Windows 10 Home and Pro Version Release Date End of Support Date 22H2 10/18/2022 10/14/2025 Windows 11 Home and Pro Version Release Date End of Support Date 24H2 10/1/2024 10/13/2026 23H2 10/31/2023 11/11/2025 Windows 11 Enterprise and Education Version Release Date End of Support Date 24H2 10/1/2024 10/12/2027 23H2 10/31/2023 11/10/2026 22H2 9/20/2022 10/14/2025 Source: Microsoft https://docs.microsoft.com/en-us/lifecycle/faq/windows
  • 18.
    Copyright © 2025Ivanti. All rights reserved. 18 Microsoft Support Ivanti Support Windows 10 22H2 reaches EOS Oct 2025 Three years of ESU support • Year 1 October 15, 2025 – October 13, 2026 • Year 2 October 14, 2026 – October 12, 2027 • Year 3 October 13, 2027 – October 10, 2028 Licensing and Pricing • Full-year purchase only • Price doubles each year • Cloud-based licensing via Windows 365 and Intune • 5 by 5 licensing via manual key download Windows 10 Extended Security Updates (ESU) ESU support based on Microsoft releases Available for three major patch products • Neurons for Patch Management • Endpoint Manager • Security Controls Familiar model • Concurrent with Microsoft support years • Offered as special content • Requires signed EULA addendum • Tiered pricing based on required endpoints • Fixed price throughout life of program
  • 19.
    Copyright © 2025Ivanti. All rights reserved. 19 Server Long-term Servicing Channel Support Server LTSC Support Version Editions Release Date Mainstream Support Ends Extended Support Ends Windows Server 2025 Datacenter and Standard 11/01/2024 10/09/2029 10/10/2034 Windows Server 2022 Datacenter and Standard 08/18/2021 10/13/2026 10/14/2031 Windows Server 2019 (Version 1809) Datacenter and Standard 11/13/2018 01/09/2024 01/09/2029 Windows Server 2016 (Version 1607) Datacenter, Essentials, and Standard 10/15/2016 01/11/2022 01/11/2027 https://learn.microsoft.com/en-us/windows-server/get-started/windows-server-release-info ▪ Focused on server long-term stability ▪ Major version releases every 2-3 years ▪ 5 years mainstream and 5 years extended support ▪ Server core or server with desktop experience available Source: Microsoft
  • 20.
    Copyright © 2025Ivanti. All rights reserved. 20 Patch Content Announcements Announcements Posted on Community Forum Pages ▪ https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2 ▪ Subscribe to receive email for the desired product(s) Content Info: Endpoint Security Content Info: Endpoint Manager Content Info: macOS Updates Content Info: Linux Updates Content Info: Patch for Configuration Manager Content Info: ISEC and Neurons Patch Content Info: Neurons Patch for InTune
  • 21.
    Copyright © 2025Ivanti. All rights reserved. 21 Bulletins and Releases
  • 22.
    Copyright © 2025Ivanti. All rights reserved. APSB25-42: Security Update for Adobe Animate ▪ Maximum Severity: Critical ▪ Affected Products: Adobe Animate version 2023 and 2024 ▪ Description: Adobe has released an update for Adobe Animate. This update resolves 5 vulnerabilities – 4 rated Critical and 1 rated Important. See https://helpx.adobe.com/security/products/animate/apsb25-42.html for more details. Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates. ▪ Impact: Arbitrary Code Execution, Denial of Service ▪ Fixes 5 Vulnerabilities: CVE-2025-30328, CVE-2025-43555, CVE-2025-43556, CVE-2025- 43557, CVE-2025-30329 ▪ Restart Required: Requires application restart 1
  • 23.
    Copyright © 2025Ivanti. All rights reserved. APSB25-44: Security Update for Adobe Bridge ▪ Maximum Severity: Critical ▪ Affected Products: Adobe Bridge versions 14 and 15 ▪ Description: Adobe has released a security update for Adobe Bridge for Windows and macOS. This update resolves 3 Critical rated vulnerabilities. See https://helpx.adobe.com/security/products/bridge/apsb25-44.html for more details. Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates. ▪ Impact: Arbitrary Code Execution ▪ Fixes 3 Vulnerabilities: CVE-2025-43545, CVE-2025-43546, CVE-2025-43547 ▪ Restart Required: Requires application restart 1
  • 24.
    Copyright © 2025Ivanti. All rights reserved. APSB25-11: Security Update for Adobe Illustrator ▪ Maximum Severity: Critical ▪ Affected Products: Adobe Illustrator 2024 and Illustrator 2025 ▪ Description: Adobe has released an update for Adobe Illustrator. This update resolves 1 critical vulnerability. See https://helpx.adobe.com/security/products/illustrator/apsb25-43.html for more details. ▪ Impact: Arbitrary Code Execution ▪ Fixes 1 Vulnerability: CVE-2025-30330 ▪ Restart Required: Requires application restart 1
  • 25.
    Copyright © 2025Ivanti. All rights reserved. APSB25-37: Security Update for Adobe InDesign ▪ Maximum Severity: Critical ▪ Affected Products: Adobe InDesign 19 and InDesign 20 ▪ Description: Adobe has released an update for Adobe InDesign. This update resolves 1 critical and 2 important vulnerabilities. See https://helpx.adobe.com/security/products/indesign/apsb25- 37.html for more details. ▪ Impact: Arbitrary Code Execution, Denial of Service ▪ Fixes 3 Vulnerabilities: CVE-2025-30318, CVE-2025-30319, CVE-2025-30320 ▪ Restart Required: Requires application restart 1
  • 26.
    Copyright © 2025Ivanti. All rights reserved. APSB25-40: Security Update for Adobe Photoshop ▪ Maximum Severity: Critical ▪ Affected Products: Adobe Photoshop versions 2024 and 2025 ▪ Description: Adobe has released an update for Adobe Photoshop for Windows and macOS. This update addresses 3 vulnerabilities rated Critical. See https://helpx.adobe.com/security/products/photoshop/apsb25-40.html for more details. Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates. ▪ Impact: Arbitrary Code Execution ▪ Fixes 3 Vulnerabilities: CVE-2025-30324, CVE-2025-30325, CVE-2025-30326 ▪ Restart Required: Requires application restart 1
  • 27.
    Copyright © 2025Ivanti. All rights reserved. 27 MS25-05-W11: Windows 11 Update ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 11 Version 22H2, 23H2, 24H2, Server 2025 and Edge Chromium ▪ Description: This bulletin references KB 5058405 (22H2/23H2), and KB 5058411 (24H2 and Server 2025). See KBs for details of all changes. ▪ Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege, and Information Disclosure ▪ Fixes 41 Vulnerabilities: CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025- 32706, and CVE-2025-32709 are known exploited. No CVEs are publicly disclosed. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: None reported 1
  • 28.
    Copyright © 2025Ivanti. All rights reserved. 28 MS25-05-W10: Windows 10 Update ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 10 Versions 1607, 1809, 22H2, Server 2016, Server 2019, Server 2022, Server 2022 Datacenter: Azure Edition and Edge Chromium ▪ Description: This bulletin references multiple KB articles. See Windows 10 and associated server KBs for details of all changes. ▪ Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege, and Information Disclosure ▪ Fixes 41 Vulnerabilities: CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025- 32706, and CVE-2025-32709 are known exploited. No CVEs are publicly disclosed. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: See next slide 1
  • 29.
    Copyright © 2025Ivanti. All rights reserved. 29 May Known Issues for Windows 10 ▪ KB 5058392 - Win 10 Enterprise LTSC 2019, Win 10 IoT Enterprise LTSC 2019, Windows 10 IoT Core LTSC, Windows Server 2019 ▪ [Citrix_SRA] Devices that have certain Citrix components installed might be unable to complete installation of the January 2025 Windows security update. This has been noted with the Citrix Session Recording Agent installed. ▪ Workaround: Citrix has provided several workaround options until they resolve the issue with Microsoft. See KB for details. ▪ KB 5058379 – Windows 10 Enterprise LTSC 2021, Windows 10 IoT Enterprise LTSC 2021, Windows 10, version 22H2, all editions ▪ [Citrix_SRA]
  • 30.
    Copyright © 2025Ivanti. All rights reserved. 30 ▪ Maximum Severity: Critical ▪ Affected Products: Excel 2016, Office 2016, Office LTSC for Mac 2021 & 2024, Office Online Server, Office for Android, Office Universal, Outlook for Android ▪ Description: This security update addresses 11 vulnerabilities in Microsoft Office and supporting products. This bulletin is based on 5 KB articles plus release notes for the Mac updates. ▪ Impact: Remote Code Execution ▪ Fixes 11 Vulnerabilities: No vulnerabilities are reported known exploited or publicly disclosed. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires application restart ▪ Known Issues: None reported MS25-05-OFF: Security Updates for Microsoft Office 1
  • 31.
    Copyright © 2025Ivanti. All rights reserved. 31 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft 365 Apps, Office 2019, Office LTSC 2021 and Office LTSC 2024 ▪ Description: This security update addresses several vulnerabilities in Microsoft Office. Information on the security updates is available at https://learn.microsoft.com/en- us/officeupdates/microsoft365-apps-security-updates. ▪ Impact: Remote Code Execution ▪ Fixes 13 Vulnerabilities: No vulnerabilities are reported known exploited or publicly disclosed. See the Security Update Guide for the complete list of CVEs ▪ Restart Required: Requires application restart ▪ Known Issues: None reported MS25-05-O365: Security Updates for Microsoft 365 Apps 1
  • 32.
    Copyright © 2025Ivanti. All rights reserved. 32 ▪ Maximum Severity: Important ▪ Affected Products: Microsoft SharePoint Server Subscription Edition, SharePoint Enterprise Server 2016, and SharePoint Server 2019 ▪ Description: This security update resolves 4 remote code execution and elevation of privilege vulnerabilities in Microsoft SharePoint Server. This bulletin is based on 5 KB articles. ▪ Impact: Remote Code Execution, Elevation of Privilege ▪ Fixes 4 Vulnerabilities: CVE-2025-29971, CVE-2025-30378, CVE-2025-30382, and CVE-2025- 30384. No CVEs are reported known exploited or publicly disclosed. ▪ Restart Required: Requires application restart ▪ Known Issues: None reported MS25-05-SPT: Security Updates for Sharepoint Server 1 2
  • 33.
    Copyright © 2025Ivanti. All rights reserved. 33 Between Patch Tuesdays
  • 34.
    Copyright © 2025Ivanti. All rights reserved. 34 Windows Release Summary ▪ Security Updates (with CVEs): Google Chrome (3), Corretto (3), Firefox (2), Firefox ESR (1), Jabra Direct (1), Java 8 (1), Java Development Kit 11 (1), Java Development Kit 17 (1), Java Development Kit 21 (1), VirtualBox (1), Python (1), Thunderbird ESR (2) ▪ Security Updates (w/o CVEs): Adobe After Effects (1), Adobe Illustrator (1), Adobe Photoshop (2), Adobe Acrobat DC and Acrobat Reader DC (2), Amazon WorkSpaces (1), Apache Tomcat (1), Azul Zulu (4), CCleaner (1), Cisco Webex Meetings Desktop App (1), Cisco Jabber (1), Google Chrome (1), Corretto 8 (1), Falcon Sensor for Windows (1), Devolutions Remote Desktop Manager (4), Docker For Windows (3), Dropbox (2), Eclipse Adoptium (4), Firefox (1), FileZilla Client (1), Foxit PDF Editor (1), Foxit PDF Editor (Subscription) (1), Foxit PDF Reader Consumer (1), Foxit PDF Reader Enterprise (1). Grammarly for Windows (4), LibreOffice (2), Node.JS (LTS Upper) (2), Notepad++ (2), NextCloud Desktop Client (2), Opera (3), PDF24 Creator (1), PDF-Xchange PRO (1), PDF-Xchange Editor Plus (1), Plex Media Server (1), PeaZip (1), RedHat OpenJDK (4), Skype (1), Slack Machine-Wide Installer (2), Snagit (1), Splunk Universal Forwarder (3), Tableau Desktop (4), Ultra Edit (1), UltraVNC (2), VirtualBox (1), VSCodium (4), WinSCP (1), Wireshark (1), Zoom Workplace (2), Zoom Outlook Plugin (1), Zoom Rooms (1), Zoom Workplace VDI (1)
  • 35.
    Copyright © 2025Ivanti. All rights reserved. 35 Windows Release Summary ▪ Non-Security Updates: 1Password (3), AIMP (3), Beyond Compare (1), Bitwarden (1), Camtasia (2), CyberDuck (1), draw.io (2), Evernote (4), Google Drive File Stream (1), GeoGebra Classic (4), GoTo Connect (1), OpenVPN Connect (1), PicPick (1), R for Windows (1), RingCentral App (Machine-Wide Installer) (2), Rocket.Chat Desktop Client (1), TortoiseHg (1), Wazuh Agent (1), Cisco Webex Teams (1), WinMerge (2)
  • 36.
    Copyright © 2025Ivanti. All rights reserved. 36 Windows Third Party CVE Information ▪ Google Chrome 135.0.7049.96 ▪ CHROME-250415, QGC1350704996 ▪ Fixes 2 Vulnerabilities: CVE-2025-3619, CVE-2025-3620 ▪ Google Chrome 136.0.7103.49 ▪ CHROME-250429, QGC1360710349 ▪ Fixes 4 Vulnerabilities: CVE-2025-4050, CVE-2025-4051, CVE-2025-4052, CVE-2025-4096 ▪ Google Chrome 136.0.7103.93 ▪ CHROME-250506, QGC1360710393 ▪ Fixes 1 Vulnerability: CVE-2025-4372 ▪ Jabra Direct 6.22.11401 ▪ JABRA-250429, QJD62211401 ▪ Fixes 1 Vulnerability: CVE-2025-2783
  • 37.
    Copyright © 2025Ivanti. All rights reserved. 37 Windows Third Party CVE Information (cont) ▪ Firefox 137.0.2 ▪ FF-250415, QFF13702 ▪ Fixes 1 Vulnerability: CVE-2025-3608 ▪ Firefox 138.0 ▪ FF-250429, QFF1380 ▪ Fixes 11 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085, CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-2025- 4091, CVE-2025-4092 ▪ Firefox ESR 128.10.0 ▪ FFE128-250429, QFFE128100 ▪ Fixes 7 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4084, CVE- 2025-4087, CVE-2025-4091, CVE-2025-4093
  • 38.
    Copyright © 2025Ivanti. All rights reserved. 38 Windows Third Party CVE Information (cont) ▪ Java Development Kit 21 Update 21.0.6 ▪ JDK21-250416, QJDK2106 ▪ Fixes 4 Vulnerabilities: CVE-2025-21587, CVE-2025-23083. CVE-2025-30691, CVE-2025-30698 ▪ Java Development Kit 17 Update 17.0.15 ▪ JDK17-250416, QJDK17015 ▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-23083, CVE-2025-30698 ▪ Java Development Kit 11 Update 11.0.27 ▪ JDK11-250416, QJDK11027 ▪ Fixes 2 Vulnerabilities: CVE-2025-21587, CVE-2025-30698 ▪ Java 8 Update 451 – JRE and JDK ▪ JAVA8-250416, QJDK8U451 and QJRE8U451 ▪ Fixes 4 Vulnerabilities: CVE-2024-47606, CVE-2024-54534, CVE-2025-21587, CVE-2025-30698
  • 39.
    Copyright © 2025Ivanti. All rights reserved. 39 Windows Third Party CVE Information (cont) ▪ Corretto 21.0.7.6.1 ▪ CRTO21-250416, QCRTOJDK2107 ▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-30691, CVE-2025-30698 ▪ Corretto 17.0.15.6.1 ▪ CRTO17-250416, QCRTOJDK17015 ▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-30691, CVE-2025-30698 ▪ Corretto 11.0.27.6.1 ▪ CRTO11-250416, QCRTOJDK11027 ▪ Fixes 3 Vulnerabilities: CVE-2025-21587, CVE-2025-30691, CVE-2025-30698
  • 40.
    Copyright © 2025Ivanti. All rights reserved. 40 Windows Third Party CVE Information (cont) ▪ Omnissa Horizon Client 8.15.0 ▪ OMHC-250416, QOMHC8150 ▪ Fixes 1 Vulnerability: CVE-2023-25230 ▪ VirtualBox 7.1.8 ▪ OVB71-250416, QOVB718 ▪ Fixes 3 Vulnerabilities: CVE-2025-30712, CVE-2025-30719, CVE-2025-30725 ▪ Python 3.13.3 ▪ PYTHN313-250415, QPYTH3133 ▪ Fixes 5 Vulnerabilities: CVE-2023-27043, CVE-2023-40217, CVE-2023-52425, CVE-2024- 11168, CVE-2024-4030 ▪ Thunderbird 128.9.2 ▪ TB-250416, QTB12892 ▪ Fixes 3 Vulnerabilities: CVE-2025-2830, CVE-2025-3522, CVE-2025-3523
  • 41.
    Copyright © 2025Ivanti. All rights reserved. 41 Windows Third Party CVE Information (cont) ▪ Thunderbird 128.10.0 ▪ TB-250429, QTB128100 ▪ Fixes 10 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085, CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE- 2025-4091, CVE-2025-4092
  • 42.
    Copyright © 2025Ivanti. All rights reserved. 42 Apple Release Summary ▪ Security Updates (with CVEs): Adobe Bridge (1), Adobe Premiere Pro (2), Apple macOS Sequoia (2), Apple macOS Sonoma (1), Apple macOS Ventura (1), Apple Safari (1), Google Chrome (3), Docker Desktop (1), Microsoft Office Excel (1), Firefox (2), Firefox ESR (2), Microsoft Edge (3), Microsoft Office OneNote (1), Microsoft Office Outlook (1), Microsoft Office PowerPoint (1), Thunderbird (2), Thunderbird ESR (2), Microsoft Office Word (1) ▪ Security Updates (w/o CVEs): Google Chrome (1), Zoom Client (1) ▪ Non-Security Updates: 1Password (2), Alfred (1), Adobe Photoshop (2), Adobe Acrobat DC and Acrobat Reader DC (1), Asana (1), Brave (4), Cyberduck (1), Devolutions Remote Desktop Manager (3), Docker Desktop (2), draw.io (2), Evernote (4), Microsoft Office Excel (1), Figma (2), Google Drive (1), Go (2), Grammarly (4), Krisp (1), LibreOffice (1), Microsoft AutoUpdate (1), Microsoft Edge (2), Obsidian (1), OneDrive (1), OpenVPN Connect (1), Microsoft Office Outlook (2), PyCharm Professional (1), Microsoft Office PowerPoint (1), Skype (1), Slack (2), Spotify (2), Microsoft Teams (1), Visual Studio Code (3), VSCodium (5), Webex Teams (1), Microsoft Office Word (2), Zoom Client (1)
  • 43.
    Copyright © 2025Ivanti. All rights reserved. 43 Apple Updates with CVE Information ▪ macOS Ventura 13.7.6 ▪ Fixes 30 Vulnerabilities: See Apple security bulletin for details ▪ macOS Sonoma 14.7.6 ▪ Fixes 33 Vulnerabilities: See Apple security bulletin for details ▪ macOS Sequoia 15.5 ▪ Fixes 50 Vulnerabilities: See Apple security bulletin for details ▪ macOS Sequoia 15.4.1 ▪ Fixes 2 Vulnerabilities: See Apple security bulletin for details ▪ Safari 18.5 ▪ Fixes 10 Vulnerabilities: See Apple security bulletin for details
  • 44.
    Copyright © 2025Ivanti. All rights reserved. 44 Apple Third Party CVE Information ▪ Adobe Bridge 2025 (15.0.4) ▪ KBRG2025MAC-250508 ▪ Fixes 1 Vulnerability: CVE-2025-27193 ▪ Adobe Premiere Pro 2024 (24.6.5) ▪ PPRO2024MAC-250425 ▪ Fixes 1 Vulnerability: CVE-2025-27196 ▪ Adobe Premiere Pro 2025 (25.2.3) ▪ PPRO2025MAC-250425 ▪ Fixes 1 Vulnerability: CVE-2025-27196 ▪ Docker Desktop 4.41.0 ▪ DOCKERMAC-250428 ▪ Fixes 1 Vulnerability: CVE-2025-3224
  • 45.
    Copyright © 2025Ivanti. All rights reserved. 45 Apple Third Party CVE Information (cont) ▪ Google Chrome 135.0.7049.96 ▪ CHROMEMAC-250416 ▪ Fixes 2 Vulnerabilities: CVE-2025-3619, CVE-2025-3620 ▪ Google Chrome 136.0.7103.49 ▪ CHROMEMAC-250429 ▪ Fixes 4 Vulnerabilities: CVE-2025-4050, CVE-2025-4051, CVE-2025-4052, CVE-2025-4096 ▪ Google Chrome 136.0.7103.93 ▪ CHROMEMAC-250506 ▪ Fixes 1 Vulnerability: CVE-2025-4372 ▪ Firefox 137.0.2 ▪ MFSA2025-25 ▪ Fixes 1 Vulnerability: CVE-2025-3608
  • 46.
    Copyright © 2025Ivanti. All rights reserved. 46 Apple Third Party CVE Information (cont) ▪ Firefox 138.0 ▪ FF-250429 ▪ Fixes 11 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085, CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE-2025- 4091, CVE-2025-4092 ▪ Firefox ESR 115.23.0 ▪ FFE115-250502 ▪ Fixes 4 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4084 ▪ Firefox ESR 128.10.0 ▪ FFE128-250429 ▪ Fixes 7 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4084, CVE- 2025-4087, CVE-2025-4091, CVE-2025-4093
  • 47.
    Copyright © 2025Ivanti. All rights reserved. 47 Apple Third Party CVE Information (cont) ▪ Microsoft Edge 135.0.3179.73 ▪ MEDGEMAC-250411 ▪ Fixes 1 Vulnerability: CVE-2025-3066 ▪ Microsoft Edge 135.0.3179.85 ▪ MEDGEMAC-250417 ▪ Fixes 2 Vulnerabilities: CVE-2025-3619, CVE-2025-3620 ▪ Microsoft Edge 136.0.3240.50 ▪ MEDGEMAC-250502 ▪ Fixes 4 Vulnerabilities: CVE-2025-4050, CVE-2025-4051, CVE-2025-4052, CVE-2025-4096
  • 48.
    Copyright © 2025Ivanti. All rights reserved. 48 Apple Third Party CVE Information (cont) ▪ Microsoft Office Excel 16.96 ▪ EXCEL-250416 ▪ Fixes 10 Vulnerabilities: CVE-2025-26642, CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749, CVE-2025-27750, CVE-2025-27751, CVE-2025-27752, CVE-2025-29791, CVE-2025-29816 ▪ Microsoft Office OneNote 16.96 ▪ ONENOTE-250416 ▪ Fixes 8 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749, CVE-2025-27752, CVE-2025-29791, CVE-2025-29816, CVE-2025-29822 ▪ Microsoft Office Outlook 16.96 ▪ OUTLOOK-250416 ▪ Fixes 7 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749, CVE-2025-27752, CVE-2025-29791, CVE-2025-29816
  • 49.
    Copyright © 2025Ivanti. All rights reserved. 49 Apple Third Party CVE Information (cont) ▪ Microsoft Office Powerpoint 16.96 ▪ POWERPOINT-250416 ▪ Fixes 7 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27748, CVE-2025-27749, CVE-2025-27752, CVE-2025-29791, CVE-2025-29816 ▪ Microsoft Office Word 16.96 ▪ WORD-250416 ▪ Fixes 9 Vulnerabilities: CVE-2025-27745, CVE-2025-27746, CVE-2025-27747, CVE-2025-27748, CVE-2025-27749, CVE-2025-27752, CVE-2025-29791, CVE-2025-29816, CVE-2025-29820 ▪ Thunderbird 137.0.2 ▪ MFSA2025-26 ▪ Fixes 1 Vulnerability: CVE-2025-3608
  • 50.
    Copyright © 2025Ivanti. All rights reserved. 50 Apple Third Party CVE Information (cont) ▪ Thunderbird 138.0 ▪ TB-250502 ▪ Fixes 11 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085, CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE- 2025-4091, CVE-2025-4092 ▪ Thunderbird ESR 128.9.2 ▪ TBE128-250416 ▪ Fixes 3 Vulnerabilities: CVE-2025-2830, CVE-2025-3522, CVE-2025-3523 ▪ Thunderbird ESR 128.10.0 ▪ TBE-250429 ▪ Fixes 10 Vulnerabilities: CVE-2025-2817, CVE-2025-4082, CVE-2025-4083, CVE-2025-4085, CVE-2025-4086, CVE-2025-4087, CVE-2025-4088, CVE-2025-4089, CVE-2025-4090, CVE- 2025-4091, CVE-2025-4092
  • 51.
    Copyright © 2025Ivanti. All rights reserved. 51 Q & A
  • 52.
    Copyright © 2025Ivanti. All rights reserved. Copyright © 2025 Ivanti. All rights reserved. 52 Thank You!