Microsoft Warns of Exploited Windows Kernel Zero-Day
The important-severity flaw (CVE-2025-62215) has been exploited, said Microsoft.

The important-severity flaw (CVE-2025-62215) has been exploited, said Microsoft.
November 11, 2025 | 2 min read

Microsoft has released a fix for an elevation-of-privilege vulnerability in Windows Kernel, as part of its regularly scheduled November security updates.
The important-severity flaw (CVE-2025-62215) has been exploited, said Microsoft, but it didn’t disclose further details. Microsoft described the attack complexity linked to the flaw as “high:” an attacker would need to be local and authenticated to successfully exploit it. They would also need to be able to win a race condition, which stems from concurrent execution using a shared resource with improper synchronization in the Windows Kernel. But if they’re able to do so, they could elevate privileges to gain SYSTEM privileges, according to Microsoft in its Tuesday security update.
“It’s also interesting to note there’s a race condition here, and it shows that some race conditions are more reliable than others,” according to Dustin Childs with Trend Micro’s Zero Day Initiative in a Tuesday writeup of the flaw. “Bugs like these are often paired with a code execution bug by malware to completely take over a system. If you must prioritize, this should be at the top of your list.”
Outside of the Kernel flaw, Microsoft issued patches for over 60 CVEs across its products. These included four critical-severity flaws:
Other flaws of note this month included a remote code execution bug in Agentic AI and Visual Studio Code (ranking 8.8 out of 10 on the CVSS severity scale). The flaw (CVE-2025-6222) stems from improper neutralization of special elements used in a command in the Visual Studio Code CoPilot Chat Extension, and could enable an unauthorized attacker to execute code over a network, said Microsoft’s advisory, which added that exploitation is “less likely.”
“A remote attacker could create a specially crafted GitHub issue within a user's repository,” according to the advisory. “To exploit this, the user must enable a particular mode on the attacker’s crafted issue, which would execute the issue’s description and enable remote code execution by the attacker.”
The number of flaws addressed in this patch Tuesday is far fewer than the number from October, which contained patches for over 170 vulnerabilities, including three that were being exploited.
November 11, 2025 | 2 min read
Lindsey O’Donnell-Welch is an award-winning journalist who strives to shed light on how security issues impact not only businesses and defenders on the front line, but also the daily lives of consumers.