{"id":76619,"date":"2025-11-13T10:30:19","date_gmt":"2025-11-13T10:30:19","guid":{"rendered":"https:\/\/www.n-able.com\/?p=76619"},"modified":"2025-11-24T16:49:00","modified_gmt":"2025-11-24T16:49:00","slug":"patch-tuesday-november-2025","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025","title":{"rendered":"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era"},"content":{"rendered":"<p>Microsoft&#8217;s November 2025 Patch Tuesday marks a significant milestone in the Windows ecosystem, delivering fixes for 63 vulnerabilities including an actively exploited Windows Kernel privilege escalation zero-day vulnerability, while simultaneously becoming the first Patch Tuesday where Windows 10 devices require Extended Security Updates (ESU) enrolment to receive patches. This month&#8217;s release represents a dramatic shift from October&#8217;s record-breaking 172 vulnerabilities, yet the presence of <span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62215\" target=\"_blank\" rel=\"noopener\">CVE-2025-62215<\/a><\/span>, a race condition vulnerability being actively exploited in the wild, elevates the urgency for IT professionals and MSPs managing Windows environments. For organizations still navigating the Windows 10 end-of-support transition, Microsoft&#8217;s emergency out-of-band update <span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/november-11-2025-kb5071959-windows-10-version-22h2-os-build-19045-6466-out-of-band-565c78a7-5b5f-4cbd-8ca8-2a73a48f4e2b\" target=\"_blank\" rel=\"noopener\">KB5071959<\/a><\/span> addresses critical ESU enrollment failures that have left many systems unable to receive security updates.<\/p>\n<h2><span>Microsoft Vulnerabilities<\/span><\/h2>\n<p><span>Microsoft addressed 63 vulnerabilities this November, a substantial decrease from the previous month&#8217;s 172 patches, with four rated as Critical and 59 as Important. The standout vulnerability demanding immediate attention is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-62215\" target=\"_blank\" rel=\"noopener\">CVE-2025-62215<\/a>, a Windows Kernel elevation of privilege flaw that Microsoft&#8217;s Threat Intelligence Center (MSTIC) confirmed is <strong>Under Active Exploitation<\/strong>. This race condition vulnerability, carrying a CVSS score of 7.0, allows an authorized local attacker to gain SYSTEM privileges by exploiting improper synchronization when accessing shared kernel resources. While the attacker must win a race condition for successful exploitation such vulnerabilities are frequently paired with code execution bugs by malware to achieve complete system compromise.<\/span><\/p>\n<p><span>The critical vulnerabilities addressed this month present significant risks across multiple attack vectors. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60724\" target=\"_blank\" rel=\"noopener\">CVE-2025-60724<\/a>, with the highest CVSS score of 9.8, is a heap-based buffer overflow in the Windows GDI+ graphics component that could enable remote code execution. An attacker could exploit this vulnerability by convincing a user to open a specially crafted document containing a malicious metafile, or more concerning, by targeting web services that parse documents without any user interaction. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62199\" target=\"_blank\" rel=\"noopener\">CVE-2025-62199<\/a>, a use-after-free vulnerability in Microsoft Office, poses particular concern as Microsoft notes the Preview Pane is an attack vector, meaning exploitation doesn&#8217;t require users to open malicious files \u2014 merely previewing them in Outlook could trigger the vulnerability.<\/span><\/p>\n<p><span>Additional critical vulnerabilities include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62214\" target=\"_blank\" rel=\"noopener\">CVE-2025-62214<\/a> affecting Visual Studio through command injection, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-30398\" target=\"_blank\" rel=\"noopener\">CVE-2025-30398<\/a> in Nuance PowerScribe 360, which exposes sensitive information including personally identifiable information through missing authorization checks. Microsoft also addressed multiple elevation of privilege vulnerabilities in the Windows Ancillary Function Driver for WinSock, including <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60719\" target=\"_blank\" rel=\"noopener\">CVE-2025-60719<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62217\" target=\"_blank\" rel=\"noopener\">CVE-2025-62217<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62213\" target=\"_blank\" rel=\"noopener\">CVE-2025-62213<\/a>, all assessed as <strong>Exploitation More Likely<\/strong> by Microsoft&#8217;s exploitability index.<\/span><\/p>\n<h2><span>Changes in Microsoft Word Default Save Location<\/span><\/h2>\n<p><span>The default behavior for Microsoft Word save locations is being changed. <\/span><\/p>\n<p><em><span>\u00abStarting today, new documents in Word desktop on Windows (Insiders) now save directly to OneDrive, with autosave enabled,\u201d according to a Copilot and OneDrive <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/onedriveblog\/copilot--onedrive-intelligence-in-every-click-inspiration-in-every-memory\/4458882#cw\" target=\"_blank\" rel=\"noopener\">announcement<\/a>. <\/span><\/em><\/p>\n<p><span>While this shouldn\u2019t have an impact on most users there will be a subset that this change creates technical and security complications for. Helpdesk teams and Security teams should be primed on these changes and be prepared with established playbooks on how to assist users. <\/span><\/p>\n<p>Windows 10 ESU: Navigating the First Post-Support Patch Tuesday<\/p>\n<p><span>The November 2025 Patch Tuesday represents a watershed moment for Windows 10 deployments, as it&#8217;s the first security update requiring Extended Security Updates (ESU) enrollment following the operating system&#8217;s <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/whats-new\/extended-security-updates\" target=\"_blank\" rel=\"noopener\">end of support on October 14, 2025<\/a>. Microsoft&#8217;s consumer ESU program offers three enrollment paths: free for users backing up to OneDrive, through Microsoft Rewards points redemption, or via a $30 one-time purchase for one year of updates. Enterprise customers face escalating costs of $61 for year one, doubling annually for up to three years, bringing the total potential cost to $427 per device.<\/span><\/p>\n<p><span>As with most significant changes to Windows Update mechanisms, the rollout of ESU has encountered some challenges. Microsoft released emergency out-of-band update <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/november-11-2025-kb5071959-windows-10-version-22h2-os-build-19045-6466-out-of-band-565c78a7-5b5f-4cbd-8ca8-2a73a48f4e2b\" target=\"_blank\" rel=\"noopener\">KB5071959<\/a> to address enrollment failures that displayed \u00abSomething went wrong\u00bb errors or indicated ESU was \u00abtemporarily unavailable\u00bb in certain regions, particularly affecting users in the European Economic Area. <a href=\"https:\/\/www.windowslatest.com\/2025\/11\/12\/windows-10-kb5071959-released-to-fix-microsofts-bug-that-accidentally-blocked-esu-extended-security-updates\/\" target=\"_blank\" rel=\"noopener\">Reports indicate<\/a> that without this fix, affected systems cannot receive the November security updates or any future patches. Organizations and individuals still running Windows 10 must first install KB5071959, complete ESU enrollment, and then check for the November cumulative update <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/november-11-2025-kb5068781-os-builds-19044-6575-and-19045-6575-7fe13257-9079-49af-9369-e0e6242701dd\" target=\"_blank\" rel=\"noopener\">KB5068781<\/a>.<\/span><\/p>\n<p><span>Looking ahead, IT professionals managing Windows 10 fleets face critical decisions. While ESU provides a temporary security lifeline, it represents a stopgap measure rather than a long-term solution. The <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/exchange\/end-of-support-for-exchange-server-2016-and-exchange-server-2019-t-12-months\/4268516\" target=\"_blank\" rel=\"noopener\">end of on-premises Exchange Server support<\/a> and fewer standalone Microsoft applications signal Microsoft&#8217;s continued push toward cloud services and Windows 11 adoption. Organizations should use the ESU period to develop migration strategies, whether to Windows 11, alternative operating systems like Linux for incompatible hardware, or cloud-based solutions such as Windows 365.<\/span><\/p>\n<p><span>Security teams should also prepare for the evolving threat landscape targeting Windows 10 systems. The long tail of Windows XP persistence in manufacturing and industrial systems demonstrated that unsupported systems can become prime targets for exploitation even when they represent a very small portion of the install base. The presence of an actively exploited kernel vulnerability in this month&#8217;s patches underscores that attackers continue developing sophisticated exploit chains, making timely patching more critical than ever.<\/span><\/p>\n<h2><span>Vulnerability Prioritization<\/span><\/h2>\n<p><span>Effective vulnerability management requires moving beyond single-dimensional severity assessments to incorporate temporal risk factors and real-world exploitation data. While CVSS scores provide a baseline understanding of technical impact, they fail to account for the window of vulnerability \u2014 the critical period between disclosure and patch deployment where exploitation risk escalates exponentially. MSPs should implement automated risk scoring frameworks that integrate multiple intelligence sources: CISA Known Exploited Vulnerabilities listings for confirmed active threats, Microsoft&#8217;s Exploitability Index assessments for likelihood metrics, Exploit Prediction Scoring System scores, and threat intelligence feeds for emerging threats targeting known vulnerabilities. This multi-dimensional approach ensures that vulnerabilities under active exploitation receive immediate prioritization regardless of their nominal severity rating, while accounting for both the technical impact and the operational reality of exploit availability. Organizations that continue relying exclusively on severity-based patching schedules expose themselves to preventable compromises, particularly from zero-day and publicly disclosed vulnerabilities that threat actors weaponize within hours of disclosure.<\/span><\/p>\n<p><em>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/em><\/p>\n<table style=\"border: black 1px solid;\">\n<tbody>\n<tr>\n<td width=\"20%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\"><strong style=\"color: white;\">CVE Number<\/strong><\/td>\n<td width=\"54%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\"><strong style=\"color: white;\">CVE Title<\/strong><\/td>\n<td width=\"10%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\">\n<p style=\"text-align: center;\"><strong style=\"color: white;\">Severity<\/strong><\/p>\n<\/td>\n<td width=\"10%\" style=\"border: black 1px solid; background-color: purple; padding-left: 5px; padding-right: 5px;\">\n<p style=\"text-align: center;\"><strong style=\"color: white;\">Status<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62215\" target=\"_blank\" rel=\"noopener\">CVE-2025-62215<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">I<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">ED<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62213\" target=\"_blank\" rel=\"noopener\">CVE-2025-62213<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">I<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59512\" target=\"_blank\" rel=\"noopener\">CVE-2025-59512<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">I<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62217\" target=\"_blank\" rel=\"noopener\">CVE-2025-62217<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">I<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60705\" target=\"_blank\" rel=\"noopener\">CVE-2025-60705<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Windows Client-Side Caching Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">I<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60719\" target=\"_blank\" rel=\"noopener\">CVE-2025-60719<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">I<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62214\" target=\"_blank\" rel=\"noopener\">CVE-2025-62214<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Visual Studio Remote Code Execution Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">C<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-30398\" target=\"_blank\" rel=\"noopener\">CVE-2025-30398<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Nuance PowerScribe 360 Information Disclosure Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">C<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60724\" target=\"_blank\" rel=\"noopener\">CVE-2025-60724<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">GDI+ Remote Code Execution Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">C<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62199\" target=\"_blank\" rel=\"noopener\">CVE-2025-62199<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">C<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60716\" target=\"_blank\" rel=\"noopener\">CVE-2025-60716<\/a><\/td>\n<td style=\"border: black 1px solid; padding-left: 5px; padding-right: 5px;\">DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">C<\/td>\n<td style=\"border: 1px solid black; padding-left: 5px; padding-right: 5px; text-align: center;\">ELL<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span>Summary<\/span><\/h2>\n<p>As organizations look to strengthen their cyber resilience, they should integrate\u00a0<a href=\"https:\/\/www.n-able.com\/solutions\/patch-management\/third-party-applications\" target=\"_blank\" rel=\"noopener\"><span>third-party patching<\/span><\/a>\u00a0priorities into their existing\u00a0<a href=\"https:\/\/www.n-able.com\/?post_type=landing-page&amp;p=3355\" target=\"_blank\" rel=\"noopener\"><span>patch management routines<\/span><\/a>, ensuring that traditionally Microsoft-focused processes expand to address the multi-vendor threat landscape that characterizes modern environments. The convergence of Actively Exploited vulnerabilities across multiple platforms underscores the importance of comprehensive, risk-based patch management strategies that extend beyond severity ratings to encompass real-world exploitation patterns and business-critical system exposure.<\/p>\n<p>As always, make sure you have established patching processes for evaluation, testing, and pushing into production. If your approach has typically centered around patching based on severity alone, it\u2019s crucial to expand your patch management strategies. Integrate priority handling into your\u00a0<a href=\"https:\/\/www.n-able.com\/?post_type=landing-page&amp;p=3355\" target=\"_blank\" rel=\"noopener\"><span>Patch Management<\/span><\/a>\u00a0routines for patches related to zero-day vulnerabilities, vulnerabilities with Detected Exploitations, and those with a higher likelihood of exploitation. The convergence of Actively Exploited vulnerabilities across multiple vendors underscores the need for comprehensive, risk-based approaches that extend beyond traditional Microsoft-focused patch management to address the multi-vendor reality of modern business networks.<span>\u00a0<\/span><\/p>\n<p><strong>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span>Patch Management section of our blog<\/span><\/a>.<\/strong><\/p>\n<p><em>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on<\/em><\/p>\n<p><em>LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span>thesecuritypope<\/span><\/a><\/em><\/p>\n<p><em>Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span>cybersec_nerd<\/span><\/a>\u00a0<\/em><\/p>\n<p><span>\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word&#8217;s new default save to OneDrive.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-76619","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era - N-able<\/title>\n<meta name=\"description\" content=\"November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word&#039;s new default save to OneDrive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era - N-able\" \/>\n<meta property=\"og:description\" content=\"November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word&#039;s new default save to OneDrive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T10:30:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T16:49:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_PD_V2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era\",\"datePublished\":\"2025-11-13T10:30:19+00:00\",\"dateModified\":\"2025-11-24T16:49:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\"},\"wordCount\":1366,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\",\"name\":\"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2025-11-13T10:30:19+00:00\",\"dateModified\":\"2025-11-24T16:49:00+00:00\",\"description\":\"November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word's new default save to OneDrive.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era - N-able","description":"November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word's new default save to OneDrive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025","og_locale":"es_ES","og_type":"article","og_title":"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era - N-able","og_description":"November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word's new default save to OneDrive.","og_url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-11-13T10:30:19+00:00","article_modified_time":"2025-11-24T16:49:00+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_PD_V2.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era","datePublished":"2025-11-13T10:30:19+00:00","dateModified":"2025-11-24T16:49:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025"},"wordCount":1366,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025","url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025","name":"Patch Tuesday November 2025: Actively Exploited Windows Kernal Zero-Day and Windows 10\u2019s New ESU Era - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2025-11-13T10:30:19+00:00","dateModified":"2025-11-24T16:49:00+00:00","description":"November 2025 Patch Tuesday: Windows 10 ESU era begins, with critical fixes for 63 vulnerabilities and a kernel zero-day, plus Word's new default save to OneDrive.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-november-2025"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/76619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=76619"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/76619\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=76619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}