ByDavey Winder,
Senior Contributor.
At the same time that Google was issuing an emergency update for all Chrome browser users in response to a high-severity security vulnerability, Microsoft issued a security warning of its own. A newly discovered zero-day vulnerability in the Windows Kernel can enable an attacker to gain system privileges. Yes, a Windows kernel zero-day. Yes, attackers have already struck. Yes, you need to update now.
The latest chapter in the never-ending cybersecurity drama that is Patch Tuesday has been released, and this time it contains no less than 63 vulnerabilities. There’s one, though, that stands out: CVE-2025-62215, an actively exploited zero-day within the Windows Kernel itself.
“While exploitation requires an attacker to win a race condition,” Satnam Narang, a senior staff research engineer at Tenable, said, “Microsoft confirmed that this vulnerability has been actively exploited in the wild.” Narang suggested that this was most likely, considering that CVE-2025-62215 is a privilege escalation flaw, “used as part of post-exploitation activity, following initial access via phishing, social engineering, or another vulnerability.”






