Table of Contents
  • Home
  • /
  • Blog
  • /
  • Breaking Down the Latest March 2025 Patch Tuesday Report
March 12, 2025
|
19m

Breaking Down the Latest March 2025 Patch Tuesday Report


A magnifying glass over business graphs with "Patch Tuesday March 2025" text on a red background.

Microsoft has released its March 2025 Patch Tuesday security updates, addressing 57-67 vulnerabilities across Windows, Office, Exchange Server, Azure, Dynamics, and other products. This month's release includes fixes for seven zero-day vulnerabilities, with six of them actively exploited in the wild.

The seven zero-days include critical flaws in the Windows Win32 Kernel Subsystem, Windows NTFS, Windows Fast FAT File System Driver, Microsoft Access, and Microsoft Management Console. One of the most notable exploited vulnerabilities is CVE-2025-26633, a security feature bypass in Microsoft Management Console.

Other critical flaws include remote code execution bugs in Windows Remote Desktop Services (CVE-2025-24035 and CVE-2025-24045), Windows Domain Name Service (CVE-2025-24064), Windows Subsystem for Linux (WSL2) Kernel (CVE-2025-24084), Microsoft Office (CVE-2025-24057), and Remote Desktop Client (CVE-2025-26645).

In total, Microsoft has addressed six critical vulnerabilities and around 50 important ones. The most common types of vulnerabilities patched this month are remote code execution (23 bugs), elevation of privilege (23 bugs), along with spoofing (3 bugs), information disclosure (4 bugs), denial of service (1 bug), and security feature bypass (3 bugs).

Key products receiving security updates include Windows, Office, Exchange Server, Azure, Dynamics 365, .NET Framework, Windows Hyper-V, and Microsoft Edge. Administrators should prioritize testing and deploying patches for the actively exploited zero-days and remote code execution flaws.

Key Highlights - Patch Tuesday March 2025

In March's Patch Tuesday, Microsoft addressed 57-67 vulnerabilities, including seven zero-day vulnerabilities with six being actively exploited in the wild. This update included patches across categories like elevation of privilege, remote code execution, information disclosure, spoofing, denial of service, and security feature bypass.

Key highlights are:

  1. Total Flaws and Zero-Day Vulnerabilities: This month's update resolves approximately 57-67 total bugs, with seven zero-days reported and six of those being actively exploited.

  2. Critical Flaws: Six vulnerabilities were rated as Critical, including flaws in Windows Remote Desktop Services, Windows Domain Name Service, Windows Subsystem for Linux, Microsoft Office, and Remote Desktop Client.

  3. Vulnerability Types: Remote code execution (23) and elevation of privilege (23) vulnerabilities lead the count, followed by information disclosure (4), spoofing (3), security feature bypass (3), and denial of service (1).

  4. Actively Exploited Zero-Days: The six actively exploited zero-days are CVE-2025-26633 (Microsoft Management Console), CVE-2025-24983 (Windows Win32 Kernel Subsystem), CVE-2025-24985 (Windows Fast FAT File System Driver), CVE-2025-24984 and CVE-2025-24991 (Windows NTFS information disclosure), and CVE-2025-24993 (Windows NTFS remote code execution).

  5. Public Disclosure: CVE-2025-26630, a Microsoft Access remote code execution vulnerability, was publicly disclosed before a patch was available.

  6. Critical-Rated Bugs: Notable critical vulnerabilities include the Windows Remote Desktop Services RCE bugs (CVE-2025-24035 and CVE-2025-24045), Windows Domain Name Service RCE (CVE-2025-24064), Windows Subsystem for Linux RCE (CVE-2025-24084), Microsoft Office RCE (CVE-2025-24057), and Remote Desktop Client RCE (CVE-2025-26645).

This March Patch Tuesday highlights Microsoft's ongoing commitment to securing its wide range of products against ever-evolving cybersecurity threats. Apply these updates to close vulnerabilities before threats exploit them.

Zero-day Vulnerabilities Patched in March 2025

In March 2025, Microsoft addressed seven zero-day vulnerabilities, with six of them actively being exploited in the wild. These vulnerabilities were particularly significant as they had been disclosed or exploited before patches were available, posing immediate risks to affected systems.

CVE-2025-24983: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

  • Vulnerability type: Elevation of Privilege

  • Affected product: Windows Win32 Kernel Subsystem

  • CVSS v3 base score: 7.0

  • Severity rating: Important

The use after free vulnerability in Windows Win32 Kernel Subsystem may allow an authorized attacker to elevate privileges locally. An attacker may exploit the vulnerability to gain SYSTEM privileges. The vulnerability requires the attacker to win a race condition, which slightly increases the attack complexity.

This is a significant vulnerability because it affects a core component within the Windows operating system. The Win32 Kernel Subsystem bridges standard Windows applications using the Win32 API and the underlying Windows kernel.

CISA has added CVE-2025-24983 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.

CVE-2025-24984: Windows NTFS Information Disclosure Vulnerability

  • Vulnerability type: Information Disclosure

  • Affected product: Windows NTFS

  • CVSS v3 base score: 4.6

  • Severity rating: Important

This vulnerability in Windows NTFS (New Technology File System) may allow an attacker to potentially read portions of heap memory. What makes this vulnerability unique is that an attacker must have physical access to the target computer to plug in a malicious USB drive.

While the CVSS score is relatively low due to the physical access requirement, this vulnerability has been actively exploited in the wild, indicating its practical usefulness to attackers.

CISA added CVE-2025-24984 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.

CVE-2025-24985: Windows Fast FAT File System Driver Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Windows Fast FAT File System Driver

  • CVSS v3 base score: 7.8

  • Severity rating: Important

The integer overflow or wraparound flaw in Windows Fast FAT Driver may allow an unauthorized attacker to execute code. Exploitation requires tricking a local user on a vulnerable system into mounting a specially crafted VHD (Virtual Hard Disk) to trigger the vulnerability.

This is the first vulnerability in the Windows Fast FAT File System to be reported since 2022 and the first to be exploited in the wild.

CISA has added CVE-2025-24985 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.

CVE-2025-24991: Windows NTFS Information Disclosure Vulnerability

Vulnerability type: Information Disclosure Affected product: Windows NTFS CVSS v3 base score: 5.5 Severity rating: Important

Inserting sensitive information into a log file in Windows NTFS may allow an authorized attacker to disclose information locally. An attacker may exploit the vulnerability to read portions of heap memory potentially. Exploitation requires tricking a local user into mounting a specially crafted VHD.

CISA has added CVE-2025-24991 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.

CVE-2025-24993: Windows NTFS Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Windows NTFS

  • CVSS v3 base score: 7.8

  • Severity rating: Important

The heap-based buffer overflow vulnerability in Windows NTFS may allow an authorized attacker to execute code locally. Similar to the other NTFS vulnerabilities, an attacker may trick a local user on a vulnerable system into mounting a specially crafted VHD to trigger the vulnerability.

CISA has added CVE-2025-24993 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.

CVE-2025-26630: Microsoft Access Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Microsoft Access

  • CVSS v3 base score: 7.8

  • Severity rating: Important

The use after free flaw in Microsoft Office Access allows an unauthorized attacker to execute code locally. An attacker must trick a user into running a malicious file to successfully exploit the vulnerability.

This is the fourth zero-day to be publicly disclosed and attributed to Unpatched.ai, with three others disclosed in Microsoft's January 2025 Patch Tuesday release.

CVE-2025-26633: Microsoft Management Console Security Feature Bypass Vulnerability

  • Vulnerability type: Security Feature Bypass

  • Affected product: Microsoft Management Console

  • CVSS v3 base score: 7.0

  • Severity rating: Important

Improper neutralization flaw in Microsoft Management Console may allow an unauthorized attacker to bypass a security feature. An attacker could exploit this vulnerability by convincing a potential target with either standard user or admin privileges to open a malicious file.

This is the second zero-day in the Microsoft Management Console to be exploited in the wild since CVE-2024-43572, a remote code execution vulnerability patched in October 2024.

CISA has added CVE-2025-26633 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.

CVE
Description
CVSSv3
Severity
Exploited?
CVE-2025-24983
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
7.0
Important
Yes
CVE-2025-24984
Windows NTFS Information Disclosure Vulnerability
4.6
Important
Yes
CVE-2025-24985
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
7.8
Important
Yes
CVE-2025-24991
Windows NTFS Information Disclosure Vulnerability
5.5
Important
Yes
CVE-2025-24993
Windows NTFS Remote Code Execution Vulnerability
7.8
Important
Yes
CVE-2025-26630
Microsoft Access Remote Code Execution Vulnerability
7.8
Important
No (publicly disclosed)
CVE-2025-26633
Microsoft Management Console Security Feature Bypass Vulnerability
7.0
Important
Yes

Critical Vulnerabilities Patched in March 2025

Microsoft's March 2025 security updates addressed six vulnerabilities rated as Critical severity. These vulnerabilities represent significant risks that could be leveraged by malicious actors in attacks. Promptly patching critical issues should be a top priority for security teams.

CVE-2025-24035 & CVE-2025-24045: Windows Remote Desktop Services Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Windows Remote Desktop Services

  • CVSS v3 base score: 8.1

  • Severity rating: Critical

These remote code execution vulnerabilities exist in Windows Remote Desktop Services (RDS), a Microsoft feature that allows users to remotely access and use Windows applications and desktops from various devices over a network connection.

The sensitive data storage in improperly locked memory flaw in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. An attacker must win a race condition to exploit the vulnerability, which slightly increases the attack complexity.

Despite this requirement, Microsoft assessed both flaws as "Exploitation More Likely" according to Microsoft's Exploitability Index, highlighting the potential risk. For CVE-2025-24035, the attacker specifically needs to target a system with the Remote Desktop Gateway role.

CVE-2025-24057: Microsoft Office Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Microsoft Office

  • CVSS v3 base score: 7.8

  • Severity rating: Critical

The heap-based buffer overflow flaw in Microsoft Office may allow an unauthorized attacker to execute code remotely. This vulnerability requires an attacker to trick the victim into opening a specially crafted file.

While the CVSS score is under 8, Microsoft rated this as Critical severity due to the widespread use of Office products and the relatively simple social engineering required to exploit it. Organizations are advised to remind their employees of best practices regarding phishing attacks and to avoid opening unusual files.

CVE-2025-24064: Windows Domain Name Service Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Windows Domain Name Service

  • CVSS v3 base score: 8.1

  • Severity rating: Critical

The use after free flaw in the DNS Server may allow an unauthorized attacker to execute code over a network. An attacker must win a race condition to exploit the vulnerability, which requires them to interleave their malicious DNS update message with a legitimate one.

The relative importance of DNS servers to an organization's infrastructure necessitates that this vulnerability be patched quickly, as information held on the DNS server can be used by an adversary to gain critical information about the layout of an organization's internal infrastructure.

CVE-2025-24084: Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Windows Subsystem for Linux

  • CVSS v3 base score: 8.4

  • Severity rating: Critical

The untrusted pointer dereference in Windows Subsystem for Linux may allow an unauthorized attacker to execute code locally. What makes this vulnerability particularly concerning is that Microsoft identified multiple attack vectors, including email.

In the worst-case scenario, simply receiving a malicious email would be enough to trigger the vulnerability without any user interaction. Alternatively, an attacker could exploit this by convincing a user to click a link to a malicious website or open a malicious instant message. The multiple attack vectors increase the risk of successful exploitation.

CVE-2025-26645: Remote Desktop Client Remote Code Execution Vulnerability

  • Vulnerability type: Remote Code Execution

  • Affected product: Remote Desktop Client

  • CVSS v3 base score: 8.8

  • Severity rating: Critical

Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network. An attacker who controls a malicious RDP server could trigger remote code execution on the client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.

This vulnerability has significant implications for lateral movement within networks, as attackers could use it to expand their footprint after gaining initial access to one system. Organizations should ensure that users only connect to trusted and verified RDP servers.

Table of Critical Vulnerabilities

CVE
Description
CVSS Score
Severity
CVE-2025-26645
Remote Desktop Client Remote Code Execution Vulnerability
8.8
Critical
CVE-2025-24084
Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
8.4
Critical
CVE-2025-24035
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2025-24045
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2025-24064
Windows Domain Name Service Remote Code Execution Vulnerability
8.1
Critical
CVE-2025-24057
Microsoft Office Remote Code Execution Vulnerability
7.8
Critical

Vulnerabilities by Category

In total, 57 vulnerabilities were addressed in March's Patch Tuesday. Remote Code Execution and Elevation of Privilege flaws top the list with 23 patches each, followed by 4 Information Disclosure, 3 Spoofing, 3 Security Feature Bypass, and 1 Denial of Service vulnerability.

Here is the breakdown of the categories patched this month:

1. Remote Code Execution – 23

2. Elevation of Privilege - 23

3. Information Disclosure – 4

4. Security Feature Bypass – 3

5. Spoofing – 3

6. Denial of Service – 1

The table below shows the CVE IDs mapped to these vulnerability types from Microsoft's March 2025 Patch Tuesday:

Vulnerability Category
CVE IDs
Remote Code Execution
CVE-2025-24035, CVE-2025-24045, CVE-2025-24056, CVE-2025-24057, CVE-2025-24064, CVE-2025-24077, CVE-2025-24079, CVE-2025-24080, CVE-2025-24081, CVE-2025-24082, CVE-2025-24083, CVE-2025-24084, CVE-2025-21180, CVE-2025-24985, CVE-2025-24993, CVE-2025-26629, CVE-2025-26630, CVE-2025-26645, CVE-2025-24051, CVE-2025-24075, CVE-2025-24078, CVE-2025-24986, CVE-2025-24043
Elevation of Privilege
CVE-2025-24044, CVE-2025-24046, CVE-2025-24048, CVE-2025-24050, CVE-2025-24059, CVE-2025-24066, CVE-2025-24067, CVE-2025-24070, CVE-2025-24072, CVE-2025-24076, CVE-2025-24983, CVE-2025-24987, CVE-2025-24988, CVE-2025-24994, CVE-2025-24995, CVE-2025-24998, CVE-2025-25003, CVE-2025-25008, CVE-2025-21199, CVE-2025-26627, CVE-2025-26631, CVE-2025-24049, CVE-2025-24686
Information Disclosure
CVE-2025-24055, CVE-2025-24984, CVE-2025-24991, CVE-2025-24992
Security Feature Bypass
CVE-2025-21247, CVE-2025-24061, CVE-2025-26633
Spoofing
CVE-2025-24054, CVE-2025-24071, CVE-2025-24996
Denial of Service
CVE-2025-24997

Remote code execution vulnerabilities continue to dominate this month, representing 40% of the March updates. Successful exploits of these critical bugs enable arbitrary code execution for extensive system control.

The equally prevalent category is elevation of privilege at 40%. These vulnerabilities empower threat actors to increase compromised user rights and often serve as key components in attack chains.

While less frequent, spoofing, security feature bypass, information disclosure, and denial of service flaws can provide attackers with critical footholds or contribute to broader attack campaigns. Systematically addressing all these categories of risk is essential against today's advanced, determined adversaries across enterprise attack surfaces.

List of Products Patched in March 2025 Patch Tuesday Report

Microsoft's March 2025 Patch Tuesday includes updates for a broad range of its products, applications, and services. Here are the applications and product components that have received patches:

Product Name
No. of Vulnerabilities Patched
Microsoft Windows
37
Microsoft Office
11
Windows Kernel
3
Azure
4
Windows NTFS
3
Windows Hyper-V
2
Remote Desktop Services
3
Windows USB Video Driver
3
Microsoft Access
1
Windows Fast FAT File System Driver
1
Windows Domain Name Service
1
Windows Subsystem for Linux
1
Microsoft Management Console
1
Kernel Streaming Service Driver
3
Windows Cross Device Service
2
ASP.NET Core & Visual Studio
4
Windows Mark of the Web
1
Windows Remote Desktop Client
1
Windows Telephony Service
1
Windows Routing and Remote Access Service
1
Azure PromptFlow
1
Azure Arc
1
Azure CLI
1
Azure Agent Installer
1
Windows exFAT File System
1

These patches address vulnerabilities across Microsoft's ecosystem, with Windows operating system components receiving the largest number of fixes. The diverse range of affected products highlights the importance of a comprehensive patching strategy for organizations using Microsoft technologies.

Summary tables

Azure vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
No
No
8.4
Azure Arc Installer Elevation of Privilege Vulnerability
No
No
7
Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
No
No
6.7
Azure Promptflow Remote Code Execution Vulnerability
No
No
6.5

Browser vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Microsoft Edge (Chromium-based) Spoofing Vulnerability
No
No
5.4
Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
No
No
N/A
Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
No
No
N/A
Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
No
No
N/A
Chromium: CVE-2025-1919 Out of bounds read in Media
No
No
N/A
Chromium: CVE-2025-1918 Out of bounds read in PDFium
No
No
N/A
Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
No
No
N/A
Chromium: CVE-2025-1916 Use after free in Profiles
No
No
N/A
Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
No
No
N/A
Chromium: CVE-2025-1914 Out of bounds read in V8
No
No
N/A

Developer Tools vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
WinDbg Remote Code Execution Vulnerability
No
No
7.5
Visual Studio Elevation of Privilege Vulnerability
No
No
7.3
Visual Studio Elevation of Privilege Vulnerability
No
No
7.3
Visual Studio Code Elevation of Privilege Vulnerability
No
No
7.3
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
No
No
7

ESU Windows vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Windows Telephony Service Remote Code Execution Vulnerability
No
No
8.8
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
8.8
Remote Desktop Client Remote Code Execution Vulnerability
No
No
8.8
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Domain Name Service Remote Code Execution Vulnerability
No
No
8.1
Windows exFAT File System Remote Code Execution Vulnerability
No
No
7.8
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
No
No
7.8
Windows NTFS Remote Code Execution Vulnerability
Yes
No
7.8
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
Yes
No
7.8
Windows Common Log File System Driver Elevation of Privilege Vulnerability
No
No
7.8
Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
No
No
7.8
Microsoft Windows File Explorer Spoofing Vulnerability
No
No
7.5
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Yes
No
7
Microsoft Management Console Security Feature Bypass Vulnerability
Yes
No
7
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
No
No
6.6
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
No
No
6.6
NTLM Hash Disclosure Spoofing Vulnerability
No
No
6.5
NTLM Hash Disclosure Spoofing Vulnerability
No
No
6.5
Windows NTFS Information Disclosure Vulnerability
Yes
No
5.5
Windows NTFS Information Disclosure Vulnerability
No
No
5.5
Windows NTFS Information Disclosure Vulnerability
Yes
No
4.6
Windows USB Video Class System Driver Information Disclosure Vulnerability
No
No
4.3
MapUrlToZone Security Feature Bypass Vulnerability
No
No
4.3
Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
No
No
N/A

Microsoft Office vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Microsoft Word Remote Code Execution Vulnerability
No
No
7.8
Microsoft Word Remote Code Execution Vulnerability
No
No
7.8
Microsoft Office Remote Code Execution Vulnerability
No
No
7.8
Microsoft Office Remote Code Execution Vulnerability
No
No
7.8
Microsoft Office Remote Code Execution Vulnerability
No
No
7.8
Microsoft Office Remote Code Execution Vulnerability
No
No
7.8
Microsoft Excel Remote Code Execution Vulnerability
No
No
7.8
Microsoft Excel Remote Code Execution Vulnerability
No
No
7.8
Microsoft Excel Remote Code Execution Vulnerability
No
No
7.8
Microsoft Access Remote Code Execution Vulnerability
No
Yes
7.8
Microsoft Word Remote Code Execution Vulnerability
No
No
7

Windows vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
No
No
8.4
Windows Mark of the Web Security Feature Bypass Vulnerability
No
No
7.8
Windows Hyper-V Elevation of Privilege Vulnerability
No
No
7.8
Windows Hyper-V Elevation of Privilege Vulnerability
No
No
7.8
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
No
No
7.8
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
No
No
7.8
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
No
No
7.8
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
No
No
7.8
Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
No
No
7.3
Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
No
No
7.3
Windows Server Elevation of Privilege Vulnerability
No
No
7.1
DirectX Graphics Kernel File Denial of Service Vulnerability
No
No
4.4

Bottom Line

Microsoft's March 2025 Patch Tuesday release addressed 57 total vulnerabilities, headlined by fixes for seven zero-day flaws, with six of them actively exploited in the wild:

  • CVE-2025-24983 (Windows Win32 Kernel Subsystem Elevation of Privilege)

  • CVE-2025-24984 (Windows NTFS Information Disclosure)

  • CVE-2025-24985 (Windows Fast FAT File System Driver Remote Code Execution)

  • CVE-2025-24991 (Windows NTFS Information Disclosure)

  • CVE-2025-24993 (Windows NTFS Remote Code Execution)

  • CVE-2025-26633 (Microsoft Management Console Security Feature Bypass)

Additionally, CVE-2025-26630 (Microsoft Access Remote Code Execution) was publicly disclosed before a patch was available.

Additional key vulnerabilities included:

  • Six critical remote code execution bugs affecting Windows Remote Desktop Services, Windows Domain Name Service, Windows Subsystem for Linux, Microsoft Office, and Remote Desktop Client.

  • Multiple important remote code execution and privilege escalation vulnerabilities across Windows, Microsoft Office, Azure, and other products.

In total, 23 remote code execution bugs and 23 elevation of privilege flaws were addressed this month. Information disclosure, spoofing, security feature bypass, and denial of service issues rounded out the rest.

The extensive patch load stresses the importance of continuous monitoring, vulnerability management, and updating to counter sophisticated multi-stage attacks targeting enterprise networks. Prioritizing remediation efforts by focusing on the actively exploited zero-days and critical-rated flaws is crucial to maintaining security posture.

We aim to keep readers informed each month in our Patch Tuesday reports. Please follow our website thesecmaster.com or subscribe to our social media pages on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram to receive similar updates.

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Report

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe