Hey Checkyourlogs Fans,
One of the challenges we face every month as IT professionals is keeping up with the sheer number of Microsoft Patch Tuesday vulnerabilities. The Microsoft Security Response Center (MSRC) does a good job publishing advisories, but digging into the data manually is time-consuming.
That’s why I was excited to find a PowerShell Script, created by Fabian Bader. You can check it out on his GitHub here:
https://github.com/f-bader/MSRC-PatchReview
This script makes it easy to query Microsoft and generate human-readable stats on vulnerabilities, exploitation status, and CVSS scores.
Running the Script
After downloading the script, I ran it against the September 2025 Patch Tuesday release with the following command:
.\patch-vuln-check.ps1 -ReportDate “2025-Sep”
Results
Here’s the full output:
Key Takeaways
- 324 vulnerabilities released in September 2025 — another heavy patch cycle.
- 44 Elevation of Privilege issues lead the pack, showing that privilege escalation remains a key risk.
- No exploited-in-the-wild CVEs reported this cycle (good news for defenders).
- 20+ High/Critical CVEs, with multiple 9.8–10 CVSS scores, including Azure Entra ID and Azure Networking issues.
- 9 vulnerabilities flagged as “More Likely to be Exploited” — these are where defenders should prioritize testing and patching.
Why This Matters
Security teams often get buried in Patch Tuesday releases. Having a way to automatically pull out counts, severity, and exploitation likelihood is a big win for prioritization.
Instead of combing through advisories manually, this script lets you immediately zero in on the riskiest vulnerabilities and start risk-based patch management.
Get the Script
You can download the PowerShell script directly from Fabian Bader’s GitHub:
https://github.com/f-bader/MSRC-PatchReview
Run it in your environment and see how it can streamline your patch triage workflow.
Dave Kawula – MVP