Saturday, November 01, 2025
Cartoon Carousel The nation’s cartoonists on the week in politics | By POLITICO STAFF 10/31/2025 05:00 AM EDT
The nation’s cartoonists on the week in politics
By POLITICO Staff



ZERO-DAYS ‘R US: Two Windows vulnerabilities, one a 0-day, are under active exploitation
Two Windows vulnerabilities, one a 0-day, are under active exploitation
Both vulnerabilities are being exploited in wide-scale operations.

A large-scale, coordinated operation
Seven months later, Microsoft still hasn’t patched the vulnerability, which stems from a bug in the Windows Shortcut binary format.
- The Windows component makes opening apps or accessing files easier and faster by allowing a single binary file to invoke them without having to navigate to their locations.
- In recent months, the ZDI-CAN-25373 tracking designation has been changed to CVE-2025-9491.


With no patch available, Windows users are left with a limited number of options for fending off attacks. The most effective countermeasure is locking down .lnk functions by blocking or restricting the usage of .lnk files from untrusted origins. This can be done by setting the Windows Explorer to disable the automatic resolution of such files. The severity rating for CVE-2025-9491 is 7 out of 10.
- CVE-2025-59287 carries a severity rating of 9.8.
- It resides in the Windows Server Update Services, which administrators use to install, patch, or delete apps on vast fleets of servers.
- Microsoft previously attempted to patch the potentially wormable remote code execution vulnerability, caused by a serialization flaw, a week earlier in its October Patch Tuesday release.
- Publicly released proof-of-concept code quickly proved that the attempted fix was incomplete
> Around the same time that Microsoft released its second fix, security firm Huntress said it had observed the WSUS flaw being exploited starting on October 23. Security firm Eye reported the same finding shortly after.
> Security firm Sophos said Wednesday that it has also observed CVE-2025-59287 being exploited “in multiple customer environments” since October 24.
“The wave of activity, which spanned several hours and targeted internet-facing WSUS servers, impacted customers across a range of industries and did not appear to be targeted attacks,” Sophos said.
“It is unclear if the threat actors behind this activity leveraged the public PoC or developed their own exploit.”


Zelensky Calls for a European Army as He Slams EU Leaders’ Response
Jan 23, 2026 During the EU Summit yesterday, the EU leaders ...
-
Flash News: Ukraine Intercepts Russian Kh-59 Cruise Missile Using US VAMPIRE Air Defense System Mounted on Boat. Ukrainian forces have made ...



%20(1).webp?resize=1600,900&ssl=1)



