0patch Profile Banner
0patch Profile
0patch

@0patch

Followers
8K
Following
526
Media
412
Statuses
4K

Microscopic cures for big security holes. 0patch (pronounced 'zero patch') Bluesky: https://t.co/js7yaM3lqN Mastodon: @[email protected]

in every running process
Joined March 2012
Don't wanna be here? Send us removal request.
@0patch
0patch
1 year
Long Live Windows 10. With 0patch.
Tweet media one
6
27
45
@0patch
0patch
9 days
If your organization is using Office 2016 or 2019 and isn’t ready for Microsoft’s end of support this October, we have a quick, simple, and affordable solution. A single 0patch license will cover Windows patches, Office patches, 0day patches and "wontfix" patches. Don't wait!.
0
3
1
@0patch
0patch
9 days
End Of Security For Microsoft Office 2016 and 2019? Not With 0patch!
Tweet media one
2
4
9
@0patch
0patch
23 days
We'd like to thank Filip Dragović (@filip_dragovic). for sharing their finding and their POC, which allowed us to reproduce the issue and create patches for our users.
0
6
12
@0patch
0patch
23 days
Micropatches Released for Windows Update Service Elevation of Privilege Vulnerability (CVE-2025-48799)
Tweet media one
1
6
14
@0patch
0patch
1 month
We'd like to thank @moiz_hehe  for sharing their finding and their POC, which allowed us to reproduce the issue and create patches for our users.
0
4
3
@0patch
0patch
1 month
Micropatches have already been distributed to, and applied on, all affected online computers with 0patch Agent in PRO or Enterprise accounts (unless Enterprise group settings prevented that). As always, no reboot was required.
1
3
1
@0patch
0patch
1 month
Micropatches were written for the following fully updated security-adopted Windows versions:. Windows 11 v21H2.Windows 10 v21H2.Windows 10 v21H1.Windows 10 v20H2.Windows 10 v2004.Windows 10 v1909.Windows 10 v1809.Windows 10 v1803.
1
1
1
@0patch
0patch
1 month
Micropatches Released for Windows Disk Cleanup Tool Elevation of Privilege Vulnerability (CVE-2025-21420)
Tweet media one
1
6
8
@0patch
0patch
1 month
Our researchers have confirmed this issue on freshly installed fully updated Windows Server 2025 domain controller, using a regular domain user as attacker. Instant domain controller BSOD by any domain user.
@SkelSec
SkelSec
2 months
Welp. reported an issue to msrc, demonstrating that kerberos TGS request with a malformed PA-FOR-X509-USER struct will crash the LSASS on any win2025 domain controller. Got the default response :/.Dunno how I feel abt this, but this was the first and last time I'm doing this.
1
9
31
@0patch
0patch
2 months
We'd like to thank Simon Lemire (@snowscan) for sharing their finding and their tool, which allowed us to reproduce the issue and create patches for our users.
0
4
4
@0patch
0patch
2 months
Micropatches Released for "WSPCoerce" Coerced Authentication via Windows Search Protocol (NO CVE/WONTFIX)
Tweet media one
1
7
10
@0patch
0patch
2 months
We'd like to thank Remco van der Meer ( with Warpnet ( for sharing their research on this vulnerability.
0
4
2
@0patch
0patch
2 months
Micropatches Released for Windows Local Session Manager (LSM) Denial of Service Vulnerability (CVE-2025-26651)
Tweet media one
1
5
8
@0patch
0patch
3 months
We would like to thank security researchers Alexandra Gofman and David Driker with @_CPResearch_ for detecting the exploitation and publishing their analysis, which made it possible for us to create a micropatch for this issue.
0
4
1
@0patch
0patch
3 months
It turned out that all our security-adopted Windows versions were affected by this issue, so we created micropatches for them all. These are already distributed and applied to all online affected systems.
1
2
1
@0patch
0patch
3 months
This exploited-in-the-wild issue is an interesting twist on binary planting that we were working on a decade and a half ago. The DLL/EXE search order just keeps on giving (to attackers, that is).
1
3
1
@0patch
0patch
3 months
Micropatches Released for WEBDAV Remote Code Execution Vulnerability (CVE-2025-33053)
Tweet media one
1
7
8
@0patch
0patch
3 months
We would like to thank security researcher Zhiniang Peng (@edwardzpeng) for publishing their analysis, which made it possible for us to create a micropatch for this issue.
0
3
5
@0patch
0patch
3 months
CVE-2025-29957 is a denial of service vulnerability allowing an attacker in the network to easily consume all available memory on a Windows Server with Windows Deployment Service installed. Our patch properly frees memory allocated by incoming requests (just like Microsoft's).
1
1
3
@0patch
0patch
3 months
Micropatches Released for Preauth DoS on Windows Deployment Service (CVE-2025-29957)
Tweet media one
1
5
12