{"id":332492,"date":"2025-03-12T11:02:00","date_gmt":"2025-03-12T15:02:00","guid":{"rendered":"https:\/\/msftnewsnow.com\/?p=332492"},"modified":"2025-06-19T06:23:43","modified_gmt":"2025-06-19T13:23:43","slug":"microsofts-march-2025-patch-tuesday-7-zero-days","status":"publish","type":"post","link":"https:\/\/msftnewsnow.com\/microsofts-march-2025-patch-tuesday-7-zero-days\/","title":{"rendered":"Microsoft&#8217;s March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws"},"content":{"rendered":"<p><a href=\"https:\/\/msftnewsnow.com\/tag\/microsoft\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> has released its March 2025 Patch Tuesday updates, resolving a total of 57 security vulnerabilities affecting various products, including Windows, Office, Remote Desktop Services, and more. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-57-flaws\/\" target=\"_blank\" rel=\"noopener\">As reported by <em>Bleeping Computer<\/em><\/a>, among these vulnerabilities are seven critical zero-day flaws\u2014six of which were actively exploited in the wild prior to the patch release.<\/p>\n<h2><strong>March 2025 Patch Tuesday Highlights<\/strong><\/h2>\n<ul>\n<li><strong>Total Vulnerabilities Fixed<\/strong>: 57<\/li>\n<li><strong>Critical Vulnerabilities<\/strong>: 7 zero-days (6 actively exploited)<\/li>\n<li><strong>Affected Products<\/strong>: Windows OS versions, Microsoft Office, Remote Desktop Services, Windows DNS Server, Windows Subsystem for Linux (WSL), and Microsoft Management Console (MMC).<\/li>\n<\/ul>\n<h2><strong>Actively Exploited Zero-Day Vulnerabilities<\/strong><\/h2>\n<p>Microsoft identified seven zero-day vulnerabilities in this month&#8217;s security release. Six of these were actively exploited by attackers:<\/p>\n<ol>\n<li><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24983\" target=\"_blank\" rel=\"noopener\">CVE-2025-24983<\/a> (Win32 Kernel Elevation of Privilege)<\/strong>: A race condition vulnerability allowing local attackers to escalate privileges to SYSTEM level. Exploited actively in targeted attacks.<\/li>\n<li><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24991\" target=\"_blank\" rel=\"noopener\">CVE-2025-24991<\/a> &amp; <a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24984\" target=\"_blank\" rel=\"noopener\">CVE-2025-24984<\/a> (Windows NTFS Information Disclosure)<\/strong>: These vulnerabilities allow attackers with physical access to exploit malicious USB drives or virtual hard disk (VHD) files to disclose sensitive data from system memory.<\/li>\n<li><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26630\" target=\"_blank\" rel=\"noopener\">CVE-2025-26630<\/a> (Microsoft Access Remote Code Execution)<\/strong>: A publicly disclosed flaw stemming from a use-after-free memory issue enabling remote code execution attacks via specially crafted Access files.<\/li>\n<li><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24985\" target=\"_blank\" rel=\"noopener\">CVE-2025-24985<\/a> (Windows Fast FAT File System Driver Integer Overflow)<\/strong>: Attackers can exploit this vulnerability by tricking users into mounting malicious VHD files, potentially executing arbitrary code remotely.<\/li>\n<li><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24993\" target=\"_blank\" rel=\"noopener\">CVE-2025-24993<\/a> (Windows NTFS Heap-Based Buffer<\/strong> <strong>Overflow)<\/strong>: Allows remote attackers to execute arbitrary code through maliciously crafted VHD files.<\/li>\n<li><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26633\" target=\"_blank\" rel=\"noopener\">CVE-2025-26633<\/a> (Microsoft Management Console Security Feature Bypass)<\/strong>: Enables attackers to bypass security restrictions by convincing users to interact with malicious MMC (.msc) files, potentially gaining unauthorized administrative access.<\/li>\n<\/ol>\n<h2><strong>Recommendations for Users and Administrators<\/strong><\/h2>\n<p>Due to the severity and active exploitation of these vulnerabilities, cybersecurity experts strongly recommend immediate patching:<\/p>\n<ol>\n<li><strong>Apply updates immediately<\/strong>: Install the March 2025 security updates promptly through Windows Update or via Microsoft&#8217;s official update channels.<\/li>\n<li><strong>Monitor suspicious activity<\/strong>: Remain vigilant against phishing attempts involving malicious attachments such as VHD or MMC (.msc) files.<\/li>\n<li><strong>Prioritize older systems<\/strong>: Pay special attention to older versions of Windows like Windows 8.1 and Server 2012 R2, as these have been explicitly targeted by exploits.<\/li>\n<li><strong>Follow official advisories<\/strong>: Regularly check Microsoft&#8217;s official security advisories and guidance from cybersecurity agencies like CISA for further recommendations.<\/li>\n<\/ol>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated that federal agencies apply these patches no later than April 1, 2025, underscoring the urgency of immediate remediation efforts.<\/p>\n<p>Below is the complete list of resolved vulnerabilities in the March 2025 Patch Tuesday updates.<\/p>\n<div>\n<table>\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<th>Severity<\/th>\n<\/tr>\n<tr>\n<td>.NET<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24043\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24043<\/a><\/td>\n<td>WinDbg Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>ASP.NET Core &amp; Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24070\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24070<\/a><\/td>\n<td>ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Agent Installer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21199\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-21199<\/a><\/td>\n<td>Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Arc<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26627\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26627<\/a><\/td>\n<td>Azure Arc Installer Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure CLI<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24049\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24049<\/a><\/td>\n<td>Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure PromptFlow<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24986\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24986<\/a><\/td>\n<td>Azure Promptflow Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Kernel Streaming WOW Thunk Service Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24995\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24995<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Local Security Authority Server (lsasrv)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24072\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24072<\/a><\/td>\n<td>Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Management Console<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26633\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26633<\/a><\/td>\n<td>Microsoft Management Console Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/msftnewsnow.com\/tag\/microsoft-office\" target=\"_blank\" rel=\"noopener\">Microsoft Office<\/a><\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24083\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24083<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26629\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26629<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24080\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24080<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24057\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24057<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Access<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26630\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26630<\/a><\/td>\n<td>Microsoft Access Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24081\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24081<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24082\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24082<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24075\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24075<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24077\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24077<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24078\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24078<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24079\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24079<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24046\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24046<\/a><\/td>\n<td>Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24067\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24067<\/a><\/td>\n<td>Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25008\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-25008<\/a><\/td>\n<td>Windows Server Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-9157\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-9157<\/a><\/td>\n<td>Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Remote Desktop Client<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26645\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26645<\/a><\/td>\n<td>Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Role: DNS Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24064\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24064<\/a><\/td>\n<td>Windows Domain Name Service Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Role: Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24048\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24048<\/a><\/td>\n<td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Role: Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24050\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24050<\/a><\/td>\n<td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/msftnewsnow.com\/tag\/visual-studio\" target=\"_blank\" rel=\"noopener\">Visual Studio<\/a><\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24998\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24998<\/a><\/td>\n<td>Visual Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/msftnewsnow.com\/tag\/visual-studio\" target=\"_blank\" rel=\"noopener\">Visual Studio<\/a><\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25003\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-25003<\/a><\/td>\n<td>Visual Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio Code<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26631\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26631<\/a><\/td>\n<td>Visual Studio Code Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24059\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24059<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Cross Device Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24994\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24994<\/a><\/td>\n<td>Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Cross Device Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24076\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24076<\/a><\/td>\n<td>Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows exFAT File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21180\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-21180<\/a><\/td>\n<td>Windows exFAT File System Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Fast FAT Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24985\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24985<\/a><\/td>\n<td>Windows Fast FAT File System Driver Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows File Explorer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24071\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24071<\/a><\/td>\n<td>Microsoft Windows File Explorer Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel Memory<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24997\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24997<\/a><\/td>\n<td>DirectX Graphics Kernel File Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24066\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24066<\/a><\/td>\n<td>Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows MapUrlToZone<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21247\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-21247<\/a><\/td>\n<td>MapUrlToZone Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Mark of the Web (MOTW)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24061\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24061<\/a><\/td>\n<td>Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24993\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24993<\/a><\/td>\n<td>Windows NTFS Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24984\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24984<\/a><\/td>\n<td>Windows NTFS Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24992\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24992<\/a><\/td>\n<td>Windows NTFS Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24991\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24991<\/a><\/td>\n<td>Windows NTFS Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTLM<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24996\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24996<\/a><\/td>\n<td>NTLM Hash Disclosure Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTLM<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24054\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24054<\/a><\/td>\n<td>NTLM Hash Disclosure Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24035\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24035<\/a><\/td>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24045\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24045<\/a><\/td>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24051\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24051<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Subsystem for Linux<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24084\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24084<\/a><\/td>\n<td>Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Telephony Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24056\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24056<\/a><\/td>\n<td>Windows Telephony Service Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows USB Video Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24988\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24988<\/a><\/td>\n<td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows USB Video Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24987\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24987<\/a><\/td>\n<td>Windows USB Video Class System Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows USB Video Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24055\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24055<\/a><\/td>\n<td>Windows USB Video Class System Driver Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32 Kernel Subsystem<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24044\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24044<\/a><\/td>\n<td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32 Kernel Subsystem<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24983\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24983<\/a><\/td>\n<td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Stay tuned to <a href=\"https:\/\/msftnewsnow.com\/\" target=\"_blank\" rel=\"noopener\">msftnewsnow.com<\/a> for continued coverage on <a href=\"https:\/\/www.microsoft.com\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>&#8216;s security updates and related developments.<\/p>\n<h2><strong>Related Posts<\/strong><\/h2>\n<ol>\n<li><a href=\"https:\/\/msftnewsnow.com\/microsoft-issues-largest-security-update-in-years\/\" target=\"_blank\" rel=\"noopener\">Microsoft issues largest security update in years for Patch Tuesday January 2025, patches 3 critical zero-day vulnerabilities<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/microsoft-october-2024-patch-tuesday-update\/\" target=\"_blank\" rel=\"noopener\">Microsoft releases critical October 2024 Patch Tuesday update, patching 118 security flaws and 2 crucial zero-days<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/september-2024-patch-tuesday-preview-what-2-expect\/\" target=\"_blank\" rel=\"noopener\">September 2024 Patch Tuesday preview: What to expect from Microsoft&amp;#8217;s latest security updates to squash bugs<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/security-updates-for-office-products-july-2024\/\" target=\"_blank\" rel=\"noopener\">Microsoft releases critical security updates for Office products, including SharePoint Server and Outlook in July 2024 Patch Tuesday<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/june-2024-patch-tuesday\/\" target=\"_blank\" rel=\"noopener\">Microsoft releases June 2024 Patch Tuesday cumulative updates KB5039212, KB5039213, and KB5039211 on Windows 11 and Windows 10<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released its March 2025 Patch Tuesday updates, resolving a total of 57 security vulnerabilities affecting various products, including Windows, Office, Remote Desktop Services, and more. As reported by Bleeping Computer, among these vulnerabilities are seven critical zero-day flaws\u2014six of which were actively exploited in the wild prior to the patch release. March 2025 &#8230; <a title=\"Microsoft&#8217;s March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws\" class=\"read-more\" href=\"https:\/\/msftnewsnow.com\/microsofts-march-2025-patch-tuesday-7-zero-days\/\" aria-label=\"Read more about Microsoft&#8217;s March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws\">Read more<\/a><\/p>\n","protected":false},"author":208461344,"featured_media":332511,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[24,2540],"tags":[40,1271,1390,778,927,930,123,32,1083,1188,1275,275,1205,1213,1228],"class_list":["post-332492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-azure","tag-cybersecurity","tag-linux","tag-microsoft","tag-microsoft-office","tag-microsoft-word","tag-outlook","tag-patch-tuesday","tag-security","tag-sharepoint","tag-visual-studio","tag-windows","tag-windows-10","tag-windows-11","tag-windows-server"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg","jetpack_shortlink":"https:\/\/wp.me\/pfgCZY-1ouM","jetpack-related-posts":[{"id":347001,"url":"https:\/\/msftnewsnow.com\/microsoft-patch-tuesday-june-2025-65-security-fix\/","url_meta":{"origin":332492,"position":0},"title":"Microsoft Patch Tuesday June 2025: 65+ Security Vulnerabilities Patched, Zero-Day Exploit Fixed","author":"Dave W. Shanahan","date":"June 11, 2025","format":false,"excerpt":"Microsoft\u2019s June 2025 Patch Tuesday has arrived, delivering urgent security fixes for a broad range of its products. The company addressed more than 65 vulnerabilities, including a zero-day exploit that was being actively used in cyber espionage campaigns. This month\u2019s updates are critical for both enterprise and individual users, reinforcing\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft Patch Tuesday June 2025: 65+ Security Vulnerabilities Patched, Zero-Day Exploit Fixed","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":350079,"url":"https:\/\/msftnewsnow.com\/july-2025-microsoft-patch-tuesday-vulnerabilities\/","url_meta":{"origin":332492,"position":1},"title":"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws","author":"Dave W. Shanahan","date":"July 8, 2025","format":false,"excerpt":"Microsoft has released its July 2025 Patch Tuesday security updates, addressing a sweeping total of 137 vulnerabilities across its product portfolio. This month\u2019s Microsoft Patch Tuesday cycle is headlined by a publicly disclosed zero-day vulnerability in Microsoft SQL Server, alongside a host of critical flaws in Microsoft Office, SharePoint, and\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":329309,"url":"https:\/\/msftnewsnow.com\/microsoft-issues-largest-security-update-in-years\/","url_meta":{"origin":332492,"position":2},"title":"Microsoft issues largest security update in years for Patch Tuesday January 2025, patches 3 critical zero-day vulnerabilities","author":"Dave W. Shanahan","date":"January 15, 2025","format":false,"excerpt":"Microsoft has released its first Patch Tuesday update of 2025, addressing a staggering 161 security vulnerabilities - the largest number of fixes in a single month since 2017. As reported by Bleeping Computer, the massive update includes security patches for three actively exploited zero-day flaws and multiple critical vulnerabilities that\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft issues January 2025 largest security updates in years, patches 3 critical zero-day vulnerabilities for January 2025","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":346470,"url":"https:\/\/msftnewsnow.com\/dmsa-vulnerability-found-in-windows-server-2025\/","url_meta":{"origin":332492,"position":3},"title":"Critical dMSA Vulnerability Found in Windows Server 2025, Dubbed &#8220;BadSuccessor,&#8221; Patch Expected Soon","author":"Dave W. Shanahan","date":"June 6, 2025","format":false,"excerpt":"A newly discovered vulnerability in Windows Server 2025\u2019s delegated Managed Service Account (dMSA) feature has sent shockwaves through the cybersecurity community. Dubbed \u201cBadSuccessor,\u201d this flaw allows attackers with minimal permissions to escalate privileges and potentially compromise entire Active Directory (AD) domains. What Is the dMSA Feature in Windows Server 2025?\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Critical dMSA Vulnerability Found in Windows Server 2025, Dubbed \"BadSuccessor,\" Patch Expected Soon","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":341923,"url":"https:\/\/msftnewsnow.com\/microsofts-may-2025-patch-tuesday-five-zero-days\/","url_meta":{"origin":332492,"position":4},"title":"Microsoft\u2019s May 2025 Patch Tuesday: Five New Zero-Days Exploited, 72 Flaws Patched: What You Need to Know","author":"Dave W. Shanahan","date":"May 14, 2025","format":false,"excerpt":"Yesterday, Microsoft released its latest Patch Tuesday security updates, addressing a total of 72 vulnerabilities across its product portfolio-including Windows, Office, Azure, and more. This month\u2019s update is especially urgent, as it patches five zero-day vulnerabilities already being exploited in the wild and two additional flaws that were publicly disclosed\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft\u2019s May 2025 Patch Tuesday: Five New Zero-Days Exploited, 72 Flaws Patched: What You Need to Know","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":334805,"url":"https:\/\/msftnewsnow.com\/april-2025-patch-tuesday-zero-day-cve-2025-29824\/","url_meta":{"origin":332492,"position":5},"title":"Microsoft April 2025 Patch Tuesday: Critical Updates Fixing 134 Vulnerabilities, Including a Zero-Day Exploit CVE-2025-29824","author":"Dave W. Shanahan","date":"April 9, 2025","format":false,"excerpt":"Microsoft has released its April 2025 Patch Tuesday updates, marking one of the most significant security releases of the year. This month\u2019s update addresses 134 vulnerabilities across its software ecosystem, including one actively exploited zero-day vulnerability. As reported by BleepingComputer, theses patches span multiple categories, with 11 critical flaws that\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft April 2025 Patch Tuesday: Critical Updates Fixing 134 Vulnerabilities, Including a Zero-Day Exploit CVE-2025-29824","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/04\/lead-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/04\/lead-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/04\/lead-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/04\/lead-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/04\/lead-scaled.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/332492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/users\/208461344"}],"replies":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/comments?post=332492"}],"version-history":[{"count":0,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/332492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media\/332511"}],"wp:attachment":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media?parent=332492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/categories?post=332492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/tags?post=332492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}