Microsoft released patches for 138 security vulnerabilities across its product portfolio in this month's Patch Tuesday update. None of the flaws have been disclosed publicly or exploited in active attacks at the time of release.

The vulnerability batch breaks down to 30 Critical-severity flaws, 104 Important-rated bugs, three Moderate issues, and one Low-severity flaw. Privilege escalation vulnerabilities dominate the patch set, with 61 such bugs addressed across Windows, Active Directory, and other core Microsoft services.

The update tackles remote code execution flaws in DNS Server and Netlogon, two critical components in Windows domain environments. DNS Server RCE vulnerabilities allow unauthenticated attackers to execute arbitrary code on systems running Microsoft DNS services. Netlogon RCE bugs affect Windows authentication protocols, potentially enabling attackers to compromise domain controllers and spread laterally through enterprise networks.

Privilege escalation bugs represent the largest category in this patch cycle, spanning Windows kernel issues, Active Directory vulnerabilities, and permission-handling flaws. These weaknesses allow local users or low-privileged accounts to gain system-level access, a common stepping stone in targeted attack chains.

Organizations running Windows Server deployments, particularly those managing Active Directory infrastructure, face elevated risk from the DNS and Netlogon flaws. Domain-joined systems are especially exposed, as compromised authentication protocols could allow attackers to bypass security controls and maintain persistence across entire networks.

Microsoft recommends immediate deployment of patches for all Critical-rated vulnerabilities. Organizations should prioritize Netlogon and DNS Server updates, as these services operate with elevated privileges and sit at the network perimeter. Testing patches in controlled environments before broad deployment remains essential, given the scope of the update and the prevalence of Windows Server systems in enterprise infrastructure.

No zero-day status or active exploitation reports diminish the urgency here.