Hey Checkyourlogs Fans,

One of the challenges we face every month as IT professionals is keeping up with the sheer number of Microsoft Patch Tuesday vulnerabilities. The Microsoft Security Response Center (MSRC) does a good job publishing advisories, but digging into the data manually is time-consuming.

A cartoon of a truck with a bear and a raccoon on top

AI-generated content may be incorrect.

That’s why I was excited to find a PowerShell Script, created by Fabian Bader. You can check it out on his GitHub here:
https://github.com/f-bader/MSRC-PatchReview

This script makes it easy to query Microsoft and generate human-readable stats on vulnerabilities, exploitation status, and CVSS scores.

Running the Script

After downloading the script, I ran it against the September 2025 Patch Tuesday release with the following command:

.\patch-vuln-check.ps1 -ReportDate “2025-Sep”

Results

Here’s the full output:

A screenshot of a computer program

AI-generated content may be incorrect.

Key Takeaways

  • 324 vulnerabilities released in September 2025 — another heavy patch cycle.
  • 44 Elevation of Privilege issues lead the pack, showing that privilege escalation remains a key risk.
  • No exploited-in-the-wild CVEs reported this cycle (good news for defenders).
  • 20+ High/Critical CVEs, with multiple 9.8–10 CVSS scores, including Azure Entra ID and Azure Networking issues.
  • 9 vulnerabilities flagged as “More Likely to be Exploited” — these are where defenders should prioritize testing and patching.

Why This Matters

Security teams often get buried in Patch Tuesday releases. Having a way to automatically pull out counts, severity, and exploitation likelihood is a big win for prioritization.

Instead of combing through advisories manually, this script lets you immediately zero in on the riskiest vulnerabilities and start risk-based patch management.

Get the Script

You can download the PowerShell script directly from Fabian Bader’s GitHub:
https://github.com/f-bader/MSRC-PatchReview

Run it in your environment and see how it can streamline your patch triage workflow.

Dave Kawula – MVP