![Patch [FIX] Tuesday – September 2025: [Hyper-V on the Hot Seat, Phone Link Priv-Esc, and NTFS RCE], E23](https://img.transistorcdn.com/BFWkfZj0MQ9c4HwP9tyA0bNNV54FbGgPg8CVCD76GkM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NTk5/M2ZlMzJmOWIyODBj/N2NjYzAzYzE3MTNl/ZmYxNi5wbmc.jpg)
Episode 23
Patch [FIX] Tuesday – September 2025: [Hyper-V on the Hot Seat, Phone Link Priv-Esc, and NTFS RCE], E23
September 9, 202518m 19s
Audio is streamed directly from the publisher (media.transistor.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
Stay ahead of September 2025 Patch Tuesday. Automox experts Ryan Braunstein, Henry Smith, and Seth Hoyt break down three high-impact items you need to act on now: Hyper-V privilege escalation, XAML/Phone Link elevation paths, and an NTFS remote code execution.
You’ll get:
- Clear patch priorities and timing.
- Likely attack paths and real-world detection tips.
- Hardening moves: WDAC/AppLocker, least privilege, Phone Link controls, and removing Hyper-V where it’s not needed.
- How to use the Automox console to group at-risk devices, push updates, disable features, and verify compliance.
Subscribe, share with your team, and tighten your local attack surface today.
Topics
Patch TuesdaycybersecurityCVEssecurity updatespatching