Microsoft has released its March 2025 Patch Tuesday security updates, addressing 57-67 vulnerabilities across Windows, Office, Exchange Server, Azure, Dynamics, and other products. This month's release includes fixes for seven zero-day vulnerabilities, with six of them actively exploited in the wild.
The seven zero-days include critical flaws in the Windows Win32 Kernel Subsystem, Windows NTFS, Windows Fast FAT File System Driver, Microsoft Access, and Microsoft Management Console. One of the most notable exploited vulnerabilities is CVE-2025-26633, a security feature bypass in Microsoft Management Console.
Other critical flaws include remote code execution bugs in Windows Remote Desktop Services (CVE-2025-24035 and CVE-2025-24045), Windows Domain Name Service (CVE-2025-24064), Windows Subsystem for Linux (WSL2) Kernel (CVE-2025-24084), Microsoft Office (CVE-2025-24057), and Remote Desktop Client (CVE-2025-26645).
In total, Microsoft has addressed six critical vulnerabilities and around 50 important ones. The most common types of vulnerabilities patched this month are remote code execution (23 bugs), elevation of privilege (23 bugs), along with spoofing (3 bugs), information disclosure (4 bugs), denial of service (1 bug), and security feature bypass (3 bugs).
Key products receiving security updates include Windows, Office, Exchange Server, Azure, Dynamics 365, .NET Framework, Windows Hyper-V, and Microsoft Edge. Administrators should prioritize testing and deploying patches for the actively exploited zero-days and remote code execution flaws.
In March's Patch Tuesday, Microsoft addressed 57-67 vulnerabilities, including seven zero-day vulnerabilities with six being actively exploited in the wild. This update included patches across categories like elevation of privilege, remote code execution, information disclosure, spoofing, denial of service, and security feature bypass.
Key highlights are:
Total Flaws and Zero-Day Vulnerabilities: This month's update resolves approximately 57-67 total bugs, with seven zero-days reported and six of those being actively exploited.
Critical Flaws: Six vulnerabilities were rated as Critical, including flaws in Windows Remote Desktop Services, Windows Domain Name Service, Windows Subsystem for Linux, Microsoft Office, and Remote Desktop Client.
Vulnerability Types: Remote code execution (23) and elevation of privilege (23) vulnerabilities lead the count, followed by information disclosure (4), spoofing (3), security feature bypass (3), and denial of service (1).
Actively Exploited Zero-Days: The six actively exploited zero-days are CVE-2025-26633 (Microsoft Management Console), CVE-2025-24983 (Windows Win32 Kernel Subsystem), CVE-2025-24985 (Windows Fast FAT File System Driver), CVE-2025-24984 and CVE-2025-24991 (Windows NTFS information disclosure), and CVE-2025-24993 (Windows NTFS remote code execution).
Public Disclosure: CVE-2025-26630, a Microsoft Access remote code execution vulnerability, was publicly disclosed before a patch was available.
Critical-Rated Bugs: Notable critical vulnerabilities include the Windows Remote Desktop Services RCE bugs (CVE-2025-24035 and CVE-2025-24045), Windows Domain Name Service RCE (CVE-2025-24064), Windows Subsystem for Linux RCE (CVE-2025-24084), Microsoft Office RCE (CVE-2025-24057), and Remote Desktop Client RCE (CVE-2025-26645).
This March Patch Tuesday highlights Microsoft's ongoing commitment to securing its wide range of products against ever-evolving cybersecurity threats. Apply these updates to close vulnerabilities before threats exploit them.
In March 2025, Microsoft addressed seven zero-day vulnerabilities, with six of them actively being exploited in the wild. These vulnerabilities were particularly significant as they had been disclosed or exploited before patches were available, posing immediate risks to affected systems.
Vulnerability type: Elevation of Privilege
Affected product: Windows Win32 Kernel Subsystem
CVSS v3 base score: 7.0
Severity rating: Important
The use after free vulnerability in Windows Win32 Kernel Subsystem may allow an authorized attacker to elevate privileges locally. An attacker may exploit the vulnerability to gain SYSTEM privileges. The vulnerability requires the attacker to win a race condition, which slightly increases the attack complexity.
This is a significant vulnerability because it affects a core component within the Windows operating system. The Win32 Kernel Subsystem bridges standard Windows applications using the Win32 API and the underlying Windows kernel.
CISA has added CVE-2025-24983 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.
Vulnerability type: Information Disclosure
Affected product: Windows NTFS
CVSS v3 base score: 4.6
Severity rating: Important
This vulnerability in Windows NTFS (New Technology File System) may allow an attacker to potentially read portions of heap memory. What makes this vulnerability unique is that an attacker must have physical access to the target computer to plug in a malicious USB drive.
While the CVSS score is relatively low due to the physical access requirement, this vulnerability has been actively exploited in the wild, indicating its practical usefulness to attackers.
CISA added CVE-2025-24984 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.
Vulnerability type: Remote Code Execution
Affected product: Windows Fast FAT File System Driver
CVSS v3 base score: 7.8
Severity rating: Important
The integer overflow or wraparound flaw in Windows Fast FAT Driver may allow an unauthorized attacker to execute code. Exploitation requires tricking a local user on a vulnerable system into mounting a specially crafted VHD (Virtual Hard Disk) to trigger the vulnerability.
This is the first vulnerability in the Windows Fast FAT File System to be reported since 2022 and the first to be exploited in the wild.
CISA has added CVE-2025-24985 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.
Inserting sensitive information into a log file in Windows NTFS may allow an authorized attacker to disclose information locally. An attacker may exploit the vulnerability to read portions of heap memory potentially. Exploitation requires tricking a local user into mounting a specially crafted VHD.
CISA has added CVE-2025-24991 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.
Vulnerability type: Remote Code Execution
Affected product: Windows NTFS
CVSS v3 base score: 7.8
Severity rating: Important
The heap-based buffer overflow vulnerability in Windows NTFS may allow an authorized attacker to execute code locally. Similar to the other NTFS vulnerabilities, an attacker may trick a local user on a vulnerable system into mounting a specially crafted VHD to trigger the vulnerability.
CISA has added CVE-2025-24993 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.
Vulnerability type: Remote Code Execution
Affected product: Microsoft Access
CVSS v3 base score: 7.8
Severity rating: Important
The use after free flaw in Microsoft Office Access allows an unauthorized attacker to execute code locally. An attacker must trick a user into running a malicious file to successfully exploit the vulnerability.
This is the fourth zero-day to be publicly disclosed and attributed to Unpatched.ai, with three others disclosed in Microsoft's January 2025 Patch Tuesday release.
Vulnerability type: Security Feature Bypass
Affected product: Microsoft Management Console
CVSS v3 base score: 7.0
Severity rating: Important
Improper neutralization flaw in Microsoft Management Console may allow an unauthorized attacker to bypass a security feature. An attacker could exploit this vulnerability by convincing a potential target with either standard user or admin privileges to open a malicious file.
This is the second zero-day in the Microsoft Management Console to be exploited in the wild since CVE-2024-43572, a remote code execution vulnerability patched in October 2024.
CISA has added CVE-2025-26633 to its Known Exploited Vulnerabilities Catalog and requested users to patch it before April 1, 2025.
CVE
|
Description
|
CVSSv3
|
Severity
|
Exploited?
|
---|---|---|---|---|
CVE-2025-24983
|
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
7.0
|
Important
|
Yes
|
CVE-2025-24984
|
Windows NTFS Information Disclosure Vulnerability
|
4.6
|
Important
|
Yes
|
CVE-2025-24985
|
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
|
7.8
|
Important
|
Yes
|
CVE-2025-24991
|
Windows NTFS Information Disclosure Vulnerability
|
5.5
|
Important
|
Yes
|
CVE-2025-24993
|
Windows NTFS Remote Code Execution Vulnerability
|
7.8
|
Important
|
Yes
|
CVE-2025-26630
|
Microsoft Access Remote Code Execution Vulnerability
|
7.8
|
Important
|
No (publicly disclosed)
|
CVE-2025-26633
|
Microsoft Management Console Security Feature Bypass Vulnerability
|
7.0
|
Important
|
Yes
|
Microsoft's March 2025 security updates addressed six vulnerabilities rated as Critical severity. These vulnerabilities represent significant risks that could be leveraged by malicious actors in attacks. Promptly patching critical issues should be a top priority for security teams.
Vulnerability type: Remote Code Execution
Affected product: Windows Remote Desktop Services
CVSS v3 base score: 8.1
Severity rating: Critical
These remote code execution vulnerabilities exist in Windows Remote Desktop Services (RDS), a Microsoft feature that allows users to remotely access and use Windows applications and desktops from various devices over a network connection.
The sensitive data storage in improperly locked memory flaw in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. An attacker must win a race condition to exploit the vulnerability, which slightly increases the attack complexity.
Despite this requirement, Microsoft assessed both flaws as "Exploitation More Likely" according to Microsoft's Exploitability Index, highlighting the potential risk. For CVE-2025-24035, the attacker specifically needs to target a system with the Remote Desktop Gateway role.
Vulnerability type: Remote Code Execution
Affected product: Microsoft Office
CVSS v3 base score: 7.8
Severity rating: Critical
The heap-based buffer overflow flaw in Microsoft Office may allow an unauthorized attacker to execute code remotely. This vulnerability requires an attacker to trick the victim into opening a specially crafted file.
While the CVSS score is under 8, Microsoft rated this as Critical severity due to the widespread use of Office products and the relatively simple social engineering required to exploit it. Organizations are advised to remind their employees of best practices regarding phishing attacks and to avoid opening unusual files.
Vulnerability type: Remote Code Execution
Affected product: Windows Domain Name Service
CVSS v3 base score: 8.1
Severity rating: Critical
The use after free flaw in the DNS Server may allow an unauthorized attacker to execute code over a network. An attacker must win a race condition to exploit the vulnerability, which requires them to interleave their malicious DNS update message with a legitimate one.
The relative importance of DNS servers to an organization's infrastructure necessitates that this vulnerability be patched quickly, as information held on the DNS server can be used by an adversary to gain critical information about the layout of an organization's internal infrastructure.
Vulnerability type: Remote Code Execution
Affected product: Windows Subsystem for Linux
CVSS v3 base score: 8.4
Severity rating: Critical
The untrusted pointer dereference in Windows Subsystem for Linux may allow an unauthorized attacker to execute code locally. What makes this vulnerability particularly concerning is that Microsoft identified multiple attack vectors, including email.
In the worst-case scenario, simply receiving a malicious email would be enough to trigger the vulnerability without any user interaction. Alternatively, an attacker could exploit this by convincing a user to click a link to a malicious website or open a malicious instant message. The multiple attack vectors increase the risk of successful exploitation.
Vulnerability type: Remote Code Execution
Affected product: Remote Desktop Client
CVSS v3 base score: 8.8
Severity rating: Critical
Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network. An attacker who controls a malicious RDP server could trigger remote code execution on the client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
This vulnerability has significant implications for lateral movement within networks, as attackers could use it to expand their footprint after gaining initial access to one system. Organizations should ensure that users only connect to trusted and verified RDP servers.
CVE
|
Description
|
CVSS Score
|
Severity
|
---|---|---|---|
CVE-2025-26645
|
Remote Desktop Client Remote Code Execution Vulnerability
|
8.8
|
Critical
|
CVE-2025-24084
|
Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
|
8.4
|
Critical
|
CVE-2025-24035
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
8.1
|
Critical
|
CVE-2025-24045
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
8.1
|
Critical
|
CVE-2025-24064
|
Windows Domain Name Service Remote Code Execution Vulnerability
|
8.1
|
Critical
|
CVE-2025-24057
|
Microsoft Office Remote Code Execution Vulnerability
|
7.8
|
Critical
|
In total, 57 vulnerabilities were addressed in March's Patch Tuesday. Remote Code Execution and Elevation of Privilege flaws top the list with 23 patches each, followed by 4 Information Disclosure, 3 Spoofing, 3 Security Feature Bypass, and 1 Denial of Service vulnerability.
Here is the breakdown of the categories patched this month:
1. Remote Code Execution – 23
2. Elevation of Privilege - 23
3. Information Disclosure – 4
4. Security Feature Bypass – 3
5. Spoofing – 3
6. Denial of Service – 1
The table below shows the CVE IDs mapped to these vulnerability types from Microsoft's March 2025 Patch Tuesday:
Vulnerability Category
|
CVE IDs
|
---|---|
Remote Code Execution
|
CVE-2025-24035, CVE-2025-24045, CVE-2025-24056, CVE-2025-24057, CVE-2025-24064, CVE-2025-24077, CVE-2025-24079, CVE-2025-24080, CVE-2025-24081, CVE-2025-24082, CVE-2025-24083, CVE-2025-24084, CVE-2025-21180, CVE-2025-24985, CVE-2025-24993, CVE-2025-26629, CVE-2025-26630, CVE-2025-26645, CVE-2025-24051, CVE-2025-24075, CVE-2025-24078, CVE-2025-24986, CVE-2025-24043
|
Elevation of Privilege
|
CVE-2025-24044, CVE-2025-24046, CVE-2025-24048, CVE-2025-24050, CVE-2025-24059, CVE-2025-24066, CVE-2025-24067, CVE-2025-24070, CVE-2025-24072, CVE-2025-24076, CVE-2025-24983, CVE-2025-24987, CVE-2025-24988, CVE-2025-24994, CVE-2025-24995, CVE-2025-24998, CVE-2025-25003, CVE-2025-25008, CVE-2025-21199, CVE-2025-26627, CVE-2025-26631, CVE-2025-24049, CVE-2025-24686
|
Information Disclosure
|
CVE-2025-24055, CVE-2025-24984, CVE-2025-24991, CVE-2025-24992
|
Security Feature Bypass
|
CVE-2025-21247, CVE-2025-24061, CVE-2025-26633
|
Spoofing
|
CVE-2025-24054, CVE-2025-24071, CVE-2025-24996
|
Denial of Service
|
CVE-2025-24997
|
Remote code execution vulnerabilities continue to dominate this month, representing 40% of the March updates. Successful exploits of these critical bugs enable arbitrary code execution for extensive system control.
The equally prevalent category is elevation of privilege at 40%. These vulnerabilities empower threat actors to increase compromised user rights and often serve as key components in attack chains.
While less frequent, spoofing, security feature bypass, information disclosure, and denial of service flaws can provide attackers with critical footholds or contribute to broader attack campaigns. Systematically addressing all these categories of risk is essential against today's advanced, determined adversaries across enterprise attack surfaces.
Microsoft's March 2025 Patch Tuesday includes updates for a broad range of its products, applications, and services. Here are the applications and product components that have received patches:
Product Name
|
No. of Vulnerabilities Patched
|
---|---|
Microsoft Windows
|
37
|
Microsoft Office
|
11
|
Windows Kernel
|
3
|
Azure
|
4
|
Windows NTFS
|
3
|
Windows Hyper-V
|
2
|
Remote Desktop Services
|
3
|
Windows USB Video Driver
|
3
|
Microsoft Access
|
1
|
Windows Fast FAT File System Driver
|
1
|
Windows Domain Name Service
|
1
|
Windows Subsystem for Linux
|
1
|
Microsoft Management Console
|
1
|
Kernel Streaming Service Driver
|
3
|
Windows Cross Device Service
|
2
|
ASP.NET Core & Visual Studio
|
4
|
Windows Mark of the Web
|
1
|
Windows Remote Desktop Client
|
1
|
Windows Telephony Service
|
1
|
Windows Routing and Remote Access Service
|
1
|
Azure PromptFlow
|
1
|
Azure Arc
|
1
|
Azure CLI
|
1
|
Azure Agent Installer
|
1
|
Windows exFAT File System
|
1
|
These patches address vulnerabilities across Microsoft's ecosystem, with Windows operating system components receiving the largest number of fixes. The diverse range of affected products highlights the importance of a comprehensive patching strategy for organizations using Microsoft technologies.
CVE
|
Title
|
Exploited?
|
Publicly disclosed?
|
CVSSv3 base score
|
---|---|---|---|---|
Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
|
No
|
No
|
8.4
|
|
Azure Arc Installer Elevation of Privilege Vulnerability
|
No
|
No
|
7
|
|
Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
|
No
|
No
|
6.7
|
|
Azure Promptflow Remote Code Execution Vulnerability
|
No
|
No
|
6.5
|
CVE
|
Title
|
Exploited?
|
Publicly disclosed?
|
CVSSv3 base score
|
---|---|---|---|---|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
No
|
No
|
5.4
|
|
Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1919 Out of bounds read in Media
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1918 Out of bounds read in PDFium
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1916 Use after free in Profiles
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
|
No
|
No
|
N/A
|
|
Chromium: CVE-2025-1914 Out of bounds read in V8
|
No
|
No
|
N/A
|
CVE
|
Title
|
Exploited?
|
Publicly disclosed?
|
CVSSv3 base score
|
---|---|---|---|---|
WinDbg Remote Code Execution Vulnerability
|
No
|
No
|
7.5
|
|
Visual Studio Elevation of Privilege Vulnerability
|
No
|
No
|
7.3
|
|
Visual Studio Elevation of Privilege Vulnerability
|
No
|
No
|
7.3
|
|
Visual Studio Code Elevation of Privilege Vulnerability
|
No
|
No
|
7.3
|
|
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
|
No
|
No
|
7
|
CVE
|
Title
|
Exploited?
|
Publicly disclosed?
|
CVSSv3 base score
|
---|---|---|---|---|
Windows Telephony Service Remote Code Execution Vulnerability
|
No
|
No
|
8.8
|
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
No
|
No
|
8.8
|
|
Remote Desktop Client Remote Code Execution Vulnerability
|
No
|
No
|
8.8
|
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
No
|
No
|
8.1
|
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
No
|
No
|
8.1
|
|
Windows Domain Name Service Remote Code Execution Vulnerability
|
No
|
No
|
8.1
|
|
Windows exFAT File System Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Windows NTFS Remote Code Execution Vulnerability
|
Yes
|
No
|
7.8
|
|
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
|
Yes
|
No
|
7.8
|
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Windows File Explorer Spoofing Vulnerability
|
No
|
No
|
7.5
|
|
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
Yes
|
No
|
7
|
|
Microsoft Management Console Security Feature Bypass Vulnerability
|
Yes
|
No
|
7
|
|
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
|
No
|
No
|
6.6
|
|
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
|
No
|
No
|
6.6
|
|
NTLM Hash Disclosure Spoofing Vulnerability
|
No
|
No
|
6.5
|
|
NTLM Hash Disclosure Spoofing Vulnerability
|
No
|
No
|
6.5
|
|
Windows NTFS Information Disclosure Vulnerability
|
Yes
|
No
|
5.5
|
|
Windows NTFS Information Disclosure Vulnerability
|
No
|
No
|
5.5
|
|
Windows NTFS Information Disclosure Vulnerability
|
Yes
|
No
|
4.6
|
|
Windows USB Video Class System Driver Information Disclosure Vulnerability
|
No
|
No
|
4.3
|
|
MapUrlToZone Security Feature Bypass Vulnerability
|
No
|
No
|
4.3
|
|
Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
|
No
|
No
|
N/A
|
CVE
|
Title
|
Exploited?
|
Publicly disclosed?
|
CVSSv3 base score
|
---|---|---|---|---|
Microsoft Word Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Word Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Office Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Office Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Office Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Office Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Excel Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Excel Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Excel Remote Code Execution Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Access Remote Code Execution Vulnerability
|
No
|
Yes
|
7.8
|
|
Microsoft Word Remote Code Execution Vulnerability
|
No
|
No
|
7
|
CVE
|
Title
|
Exploited?
|
Publicly disclosed?
|
CVSSv3 base score
|
---|---|---|---|---|
Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
|
No
|
No
|
8.4
|
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
No
|
No
|
7.8
|
|
Windows Hyper-V Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Windows Hyper-V Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
No
|
No
|
7.8
|
|
Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
|
No
|
No
|
7.3
|
|
Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
|
No
|
No
|
7.3
|
|
Windows Server Elevation of Privilege Vulnerability
|
No
|
No
|
7.1
|
|
DirectX Graphics Kernel File Denial of Service Vulnerability
|
No
|
No
|
4.4
|
Microsoft's March 2025 Patch Tuesday release addressed 57 total vulnerabilities, headlined by fixes for seven zero-day flaws, with six of them actively exploited in the wild:
CVE-2025-24983 (Windows Win32 Kernel Subsystem Elevation of Privilege)
CVE-2025-24984 (Windows NTFS Information Disclosure)
CVE-2025-24985 (Windows Fast FAT File System Driver Remote Code Execution)
CVE-2025-24991 (Windows NTFS Information Disclosure)
CVE-2025-24993 (Windows NTFS Remote Code Execution)
CVE-2025-26633 (Microsoft Management Console Security Feature Bypass)
Additionally, CVE-2025-26630 (Microsoft Access Remote Code Execution) was publicly disclosed before a patch was available.
Additional key vulnerabilities included:
Six critical remote code execution bugs affecting Windows Remote Desktop Services, Windows Domain Name Service, Windows Subsystem for Linux, Microsoft Office, and Remote Desktop Client.
Multiple important remote code execution and privilege escalation vulnerabilities across Windows, Microsoft Office, Azure, and other products.
In total, 23 remote code execution bugs and 23 elevation of privilege flaws were addressed this month. Information disclosure, spoofing, security feature bypass, and denial of service issues rounded out the rest.
The extensive patch load stresses the importance of continuous monitoring, vulnerability management, and updating to counter sophisticated multi-stage attacks targeting enterprise networks. Prioritizing remediation efforts by focusing on the actively exploited zero-days and critical-rated flaws is crucial to maintaining security posture.
We aim to keep readers informed each month in our Patch Tuesday reports. Please follow our website thesecmaster.com or subscribe to our social media pages on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram to receive similar updates.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.