{"id":334805,"date":"2025-04-09T06:58:58","date_gmt":"2025-04-09T13:58:58","guid":{"rendered":"https:\/\/msftnewsnow.com\/?p=334805"},"modified":"2025-06-27T19:59:37","modified_gmt":"2025-06-28T02:59:37","slug":"april-2025-patch-tuesday-zero-day-cve-2025-29824","status":"publish","type":"post","link":"https:\/\/msftnewsnow.com\/april-2025-patch-tuesday-zero-day-cve-2025-29824\/","title":{"rendered":"Microsoft April 2025 Patch Tuesday: Critical Updates Fixing 134 Vulnerabilities, Including a Zero-Day Exploit CVE-2025-29824"},"content":{"rendered":"<p>Microsoft has released its April 2025 <a href=\"https:\/\/msftnewsnow.com\/tag\/patch-tuesday\" target=\"_blank\" rel=\"noopener\">Patch Tuesday<\/a> updates, marking one of the most significant security releases of the year. This month\u2019s update addresses <strong>134 vulnerabilities<\/strong> across its software ecosystem, including one actively exploited <strong>zero-day vulnerability<\/strong>. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-april-2025-patch-tuesday-fixes-exploited-zero-day-134-flaws\/\" target=\"_blank\" rel=\"noopener\">As reported by <\/a><em>BleepingComputer, t<\/em>heses patches span multiple categories, with <strong>11 critical flaws<\/strong> that demand immediate attention from system administrators and users alike.<\/p>\n<p>See also: <a href=\"https:\/\/msftnewsnow.com\/microsofts-march-2025-patch-tuesday-7-zero-days\/\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws<\/a><\/p>\n<h2><strong>Microsoft April 2025 Patch Tuesday updates<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"334851\" data-permalink=\"https:\/\/msftnewsnow.com\/april-2025-patch-tuesday-zero-day-cve-2025-29824\/patch-tuesday\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"1024,576\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;{\\&quot;prompt\\&quot;:\\&quot;Microsoft April 2025 Patch Tuesday\\&quot;,\\&quot;originalPrompt\\&quot;:\\&quot;Microsoft April 2025 Patch Tuesday\\&quot;,\\&quot;width\\&quot;:1024,\\&quot;height\\&quot;:576,\\&quot;seed\\&quot;:42,\\&quot;model\\&quot;:\\&quot;flux\\&quot;,\\&quot;enhance\\&quot;:false,\\&quot;nologo\\&quot;:true,\\&quot;negative_prompt\\&quot;:\\&quot;worst quality, blurry\\&quot;,\\&quot;nofeed\\&quot;:false,\\&quot;safe\\&quot;:false,\\&quot;isMature\\&quot;:false,\\&quot;isChild\\&quot;:false}&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"patch tuesday\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;{&#8220;prompt&#8221;:&#8221;Microsoft April 2025 Patch Tuesday&#8221;,&#8221;originalPrompt&#8221;:&#8221;Microsoft April 2025 Patch Tuesday&#8221;,&#8221;width&#8221;:1024,&#8221;height&#8221;:576,&#8221;seed&#8221;:42,&#8221;model&#8221;:&#8221;flux&#8221;,&#8221;enhance&#8221;:false,&#8221;nologo&#8221;:true,&#8221;negative_prompt&#8221;:&#8221;worst quality, blurry&#8221;,&#8221;nofeed&#8221;:false,&#8221;safe&#8221;:false,&#8221;isMature&#8221;:false,&#8221;isChild&#8221;:false}&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"wp-image-334851 size-full\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"Microsoft April 2025 Patch Tuesday: Critical Updates Fixing 134 Vulnerabilities, Including a Zero-Day Exploit CVE-2025-29824\" width=\"1024\" height=\"576\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 1024w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday-150x84.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=204&amp;ssl=1 204w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=409&amp;ssl=1 409w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=614&amp;ssl=1 614w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/04\/patch-tuesday.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=819&amp;ssl=1 819w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h3><strong>1. Zero-Day Exploit (CVE-2025-29824)<\/strong><\/h3>\n<p>The most concerning vulnerability is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29824\" target=\"_blank\" rel=\"noopener\">CVE-2025-29824,<\/a> an elevation of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/04\/08\/exploitation-of-clfs-zero-day-leads-to-ransomware-activity\/\" target=\"_blank\" rel=\"noopener\">privilege flaw in the Windows Common Log File System (CLFS) driver<\/a>. This issue stems from improper memory handling, allowing attackers to gain SYSTEM-level privileges without requiring administrative access. Cybersecurity experts warn that this vulnerability is particularly dangerous in post-compromise scenarios, enabling attackers to maintain persistence and move laterally across networks.<\/p>\n<h3><strong>2. Critical Vulnerabilities<\/strong><\/h3>\n<p>Microsoft patched <strong>31 remote code execution (RCE) vulnerabilities<\/strong>, including:<\/p>\n<ol>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-26663\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-26663<\/strong><\/a>: LDAP RCE Vulnerability<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27745\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-27745<\/strong><\/a>: Microsoft Office RCE Vulnerability<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27480\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-27480<\/strong><\/a>: Remote Desktop Services RCE Vulnerability<\/li>\n<\/ol>\n<p>These flaws could allow attackers to execute malicious code remotely, posing significant risks to unpatched systems.<\/p>\n<h3><strong>3. Quality Updates for Windows<\/strong><\/h3>\n<p>The update includes non-security improvements:<\/p>\n<ol>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/april-8-2025-kb5055523-os-build-26100-3775-277a9d11-6ebf-410c-99f7-8c61957461eb\" target=\"_blank\" rel=\"noopener\">Windows 11 KB5055523<\/a>\u00a0enhances machine password rotation and AI-powered features like Windows Search.<\/li>\n<li>Updates for <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/april-8-2025-kb5055518-os-builds-19044-5737-and-19045-5737-6329246b-63bb-4d0a-9e95-e22926fbbe51\" target=\"_blank\" rel=\"noopener\">Windows 10 KB5055518<\/a> are delayed but expected soon. Download the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5055518\" target=\"_blank\" rel=\"noopener\">update manually from the Microsoft Update Catalog<\/a>.<\/li>\n<\/ol>\n<h3><strong>4. Breakdown of Vulnerabilities<\/strong><\/h3>\n<p>The vulnerabilities addressed in this update span several categories:<\/p>\n<ol>\n<li><strong>Elevation of Privilege<\/strong>: 49 vulnerabilities<\/li>\n<li><strong>Remote Code Execution<\/strong>: 31 vulnerabilities<\/li>\n<li><strong>Information Disclosure<\/strong>: 17 vulnerabilities<\/li>\n<li><strong>Denial of Service<\/strong>: 14 vulnerabilities<\/li>\n<li><strong>Security Feature Bypass<\/strong>: 9 vulnerabilities<\/li>\n<li><strong>Spoofing<\/strong>: 3 vulnerabilities.<\/li>\n<\/ol>\n<h2><strong>Why These April 2025 Patch Tuesday Updates Matter<\/strong><\/h2>\n<p>The actively exploited zero-day vulnerability highlights the urgency of applying these April 2025 Patch Tuesday updates. Attackers leveraging <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29824\" target=\"_blank\" rel=\"noopener\">CVE-2025-29824<\/a> can escalate permissions beyond initial access levels, enabling them to install malware, modify system settings, or access sensitive data. Furthermore, the critical RCE flaws in widely used components like <a href=\"https:\/\/msftnewsnow.com\/tag\/microsoft-office\" target=\"_blank\" rel=\"noopener\">Microsoft Office<\/a> and Remote Desktop Services underscore the importance of securing enterprise environments.<\/p>\n<p>Microsoft\u2019s April 2025 Patch Tuesday updates serve as a reminder of the ever-evolving threat landscape in cybersecurity. With over a hundred vulnerabilities addressed\u2014including an actively exploited zero-day\u2014this update is crucial for maintaining system integrity and protecting sensitive data.<\/p>\n<p data-inc=\"2\">Below is the complete list of resolved vulnerabilities in the April 2025 Patch Tuesday updates.<\/p>\n<div>\n<table>\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<th>Severity<\/th>\n<\/tr>\n<tr>\n<td>Active Directory Domain Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29810\" target=\"_blank\" rel=\"noopener\">CVE-2025-29810<\/a><\/td>\n<td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>ASP.NET Core<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26682\" target=\"_blank\" rel=\"noopener\">CVE-2025-26682<\/a><\/td>\n<td>ASP.NET Core and Visual Studio Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Local<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27489\" target=\"_blank\" rel=\"noopener\">CVE-2025-27489<\/a><\/td>\n<td>Azure Local Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Local Cluster<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26628\" target=\"_blank\" rel=\"noopener\">CVE-2025-26628<\/a><\/td>\n<td>Azure Local Cluster Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Local Cluster<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25002\" target=\"_blank\" rel=\"noopener\">CVE-2025-25002<\/a><\/td>\n<td>Azure Local Cluster Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Portal Windows Admin Center<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29819\" target=\"_blank\" rel=\"noopener\">CVE-2025-29819<\/a><\/td>\n<td>Windows Admin Center in Azure Portal Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dynamics Business Central<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29821\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29821<\/a><\/td>\n<td>Microsoft Dynamics Business Central Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft AutoUpdate (MAU)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29800\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29800<\/a><\/td>\n<td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft AutoUpdate (MAU)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29801\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29801<\/a><\/td>\n<td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3073\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3073<\/a><\/td>\n<td>Chromium: CVE-2025-3073 Inappropriate implementation in Autofill<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3068\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3068<\/a><\/td>\n<td>Chromium: CVE-2025-3068 Inappropriate implementation in Intents<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3074\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3074<\/a><\/td>\n<td>Chromium: CVE-2025-3074 Inappropriate implementation in Downloads<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3067\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3067<\/a><\/td>\n<td>Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3071\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3071<\/a><\/td>\n<td>Chromium: CVE-2025-3071 Inappropriate implementation in Navigations<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3072\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3072<\/a><\/td>\n<td>Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3070\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3070<\/a><\/td>\n<td>Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3069\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3069<\/a><\/td>\n<td>Chromium: CVE-2025-3069 Inappropriate implementation in Extensions<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25000\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-25000<\/a><\/td>\n<td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29815\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29815<\/a><\/td>\n<td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25001\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-25001<\/a><\/td>\n<td>Microsoft Edge for iOS Spoofing Vulnerability<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3066\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-3066<\/a><\/td>\n<td>Chromium: CVE-2025-3066 Use after free in Navigations<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge for iOS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29796\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29796<\/a><\/td>\n<td>Microsoft Edge for iOS Spoofing Vulnerability<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27745\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27745<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27744\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27744<\/a><\/td>\n<td>Microsoft Office Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26642\" target=\"_blank\" rel=\"noopener\">CVE-2025-26642<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29792\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29792<\/a><\/td>\n<td>Microsoft Office Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29791\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29791<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27748\" target=\"_blank\" rel=\"noopener\">CVE-2025-27748<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27746\" target=\"_blank\" rel=\"noopener\">CVE-2025-27746<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27749\" target=\"_blank\" rel=\"noopener\">CVE-2025-27749<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27751\" target=\"_blank\" rel=\"noopener\">CVE-2025-27751<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27750\" target=\"_blank\" rel=\"noopener\">CVE-2025-27750<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29823\" target=\"_blank\" rel=\"noopener\">CVE-2025-29823<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27752\" target=\"_blank\" rel=\"noopener\">CVE-2025-27752<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office OneNote<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29822\" target=\"_blank\" rel=\"noopener\">CVE-2025-29822<\/a><\/td>\n<td>Microsoft OneNote Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29794\" target=\"_blank\" rel=\"noopener\">CVE-2025-29794<\/a><\/td>\n<td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29793\" target=\"_blank\" rel=\"noopener\">CVE-2025-29793<\/a><\/td>\n<td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27747\" target=\"_blank\" rel=\"noopener\">CVE-2025-27747<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29816\" target=\"_blank\" rel=\"noopener\">CVE-2025-29816<\/a><\/td>\n<td>Microsoft Word Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29820\" target=\"_blank\" rel=\"noopener\">CVE-2025-29820<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27471\" target=\"_blank\" rel=\"noopener\">CVE-2025-27471<\/a><\/td>\n<td>Microsoft Streaming Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Virtual Hard Drive<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26688\" target=\"_blank\" rel=\"noopener\">CVE-2025-26688<\/a><\/td>\n<td>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>OpenSSH for Windows<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27731\" target=\"_blank\" rel=\"noopener\">CVE-2025-27731<\/a><\/td>\n<td>Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Outlook for Android<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29805\" target=\"_blank\" rel=\"noopener\">CVE-2025-29805<\/a><\/td>\n<td>Outlook for Android Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Remote Desktop Client<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27487\" target=\"_blank\" rel=\"noopener\">CVE-2025-27487<\/a><\/td>\n<td>Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Remote Desktop Gateway Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27482\" target=\"_blank\" rel=\"noopener\">CVE-2025-27482<\/a><\/td>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Remote Desktop Gateway Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27480\" target=\"_blank\" rel=\"noopener\">CVE-2025-27480<\/a><\/td>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>RPC Endpoint Mapper Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26679\" target=\"_blank\" rel=\"noopener\">CVE-2025-26679<\/a><\/td>\n<td>RPC Endpoint Mapper Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>System Center<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27743\" target=\"_blank\" rel=\"noopener\">CVE-2025-27743<\/a><\/td>\n<td>Microsoft System Center Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29802\" target=\"_blank\" rel=\"noopener\">CVE-2025-29802<\/a><\/td>\n<td>Visual Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29804\" target=\"_blank\" rel=\"noopener\">CVE-2025-29804<\/a><\/td>\n<td>Visual Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio Code<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-20570\" target=\"_blank\" rel=\"noopener\">CVE-2025-20570<\/a><\/td>\n<td>Visual Studio Code Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio Tools for Applications and SQL Server Management Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29803\" target=\"_blank\" rel=\"noopener\">CVE-2025-29803<\/a><\/td>\n<td>Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Active Directory Certificate Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27740\" target=\"_blank\" rel=\"noopener\">CVE-2025-27740<\/a><\/td>\n<td>Active Directory Certificate Services Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows BitLocker<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26637\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26637<\/a><\/td>\n<td>BitLocker Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Bluetooth Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27490\" target=\"_blank\" rel=\"noopener\">CVE-2025-27490<\/a><\/td>\n<td>Windows Bluetooth Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29824\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29824<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Cryptographic Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29808\" target=\"_blank\" rel=\"noopener\">CVE-2025-29808<\/a><\/td>\n<td>Windows Cryptographic Services Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Cryptographic Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26641\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26641<\/a><\/td>\n<td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Defender Application Control (WDAC)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26678\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26678<\/a><\/td>\n<td>Windows Defender Application Control Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Digital Media<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27730\" target=\"_blank\" rel=\"noopener\">CVE-2025-27730<\/a><\/td>\n<td>Windows Digital Media Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Digital Media<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27467\" target=\"_blank\" rel=\"noopener\">CVE-2025-27467<\/a><\/td>\n<td>Windows Digital Media Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Digital Media<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26640\" target=\"_blank\" rel=\"noopener\">CVE-2025-26640<\/a><\/td>\n<td>Windows Digital Media Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Digital Media<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27476\" target=\"_blank\" rel=\"noopener\">CVE-2025-27476<\/a><\/td>\n<td>Windows Digital Media Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows DWM Core Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24074\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24074<\/a><\/td>\n<td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows DWM Core Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24073\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24073<\/a><\/td>\n<td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows DWM Core Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24058\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24058<\/a><\/td>\n<td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows DWM Core Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24062\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24062<\/a><\/td>\n<td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows DWM Core Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24060\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24060<\/a><\/td>\n<td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Hello<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26635\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26635<\/a><\/td>\n<td>Windows Hello Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Hello<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26644\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26644<\/a><\/td>\n<td>Windows Hello Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows HTTP.sys<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27473\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27473<\/a><\/td>\n<td>HTTP.sys Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27491\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27491<\/a><\/td>\n<td>Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Installer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27727\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27727<\/a><\/td>\n<td>Windows Installer Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kerberos<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26647\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26647<\/a><\/td>\n<td>Windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kerberos<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27479\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27479<\/a><\/td>\n<td>Kerberos Key Distribution Proxy Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kerberos<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29809\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29809<\/a><\/td>\n<td>Windows Kerberos Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26648\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26648<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27739\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27739<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel Memory<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29812\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29812<\/a><\/td>\n<td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27728\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27728<\/a><\/td>\n<td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26673\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26673<\/a><\/td>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26663\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26663<\/a><\/td>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27469\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27469<\/a><\/td>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26670\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26670<\/a><\/td>\n<td>Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Local Security Authority (LSA)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21191\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-21191<\/a><\/td>\n<td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Local Security Authority (LSA)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27478\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27478<\/a><\/td>\n<td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Local Session Manager (LSM)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26651\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26651<\/a><\/td>\n<td>Windows Local Session Manager (LSM) Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Mark of the Web (MOTW)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27472\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-27472<\/a><\/td>\n<td>Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Media<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26666\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26666<\/a><\/td>\n<td>Windows Media Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Media<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26674\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26674<\/a><\/td>\n<td>Windows Media Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29811\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-29811<\/a><\/td>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27742\" target=\"_blank\" rel=\"noopener\">CVE-2025-27742<\/a><\/td>\n<td>NTFS Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21197\" target=\"_blank\" rel=\"noopener\">CVE-2025-21197<\/a><\/td>\n<td>Windows NTFS Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27741\" target=\"_blank\" rel=\"noopener\">CVE-2025-27741<\/a><\/td>\n<td>NTFS Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27483\" target=\"_blank\" rel=\"noopener\">CVE-2025-27483<\/a><\/td>\n<td>NTFS Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows NTFS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27733\" target=\"_blank\" rel=\"noopener\">CVE-2025-27733<\/a><\/td>\n<td>NTFS Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Power Dependency Coordinator<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27736\" target=\"_blank\" rel=\"noopener\">CVE-2025-27736<\/a><\/td>\n<td>Windows Power Dependency Coordinator Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26671\" target=\"_blank\" rel=\"noopener\">CVE-2025-26671<\/a><\/td>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Resilient File System (ReFS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27738\" target=\"_blank\" rel=\"noopener\">CVE-2025-27738<\/a><\/td>\n<td>Windows Resilient File System (ReFS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27474\" target=\"_blank\" rel=\"noopener\">CVE-2025-27474<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21203\" target=\"_blank\" rel=\"noopener\">CVE-2025-21203<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26668\" target=\"_blank\" rel=\"noopener\">CVE-2025-26668<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26667\" target=\"_blank\" rel=\"noopener\">CVE-2025-26667<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26664\" target=\"_blank\" rel=\"noopener\">CVE-2025-26664<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26672\" target=\"_blank\" rel=\"noopener\">CVE-2025-26672<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26669\" target=\"_blank\" rel=\"noopener\">CVE-2025-26669<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26676\" target=\"_blank\" rel=\"noopener\">CVE-2025-26676<\/a><\/td>\n<td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Secure Channel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27492\" target=\"_blank\" rel=\"noopener\">CVE-2025-27492<\/a><\/td>\n<td>Windows Secure Channel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Secure Channel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26649\" target=\"_blank\" rel=\"noopener\">CVE-2025-26649<\/a><\/td>\n<td>Windows Secure Channel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Security Zone Mapping<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27737\" target=\"_blank\" rel=\"noopener\">CVE-2025-27737<\/a><\/td>\n<td>Windows Security Zone Mapping Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27729\" target=\"_blank\" rel=\"noopener\">CVE-2025-27729<\/a><\/td>\n<td>Windows Shell Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Standards-Based Storage Management Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27485\" target=\"_blank\" rel=\"noopener\">CVE-2025-27485<\/a><\/td>\n<td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Standards-Based Storage Management Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27486\" target=\"_blank\" rel=\"noopener\">CVE-2025-27486<\/a><\/td>\n<td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Standards-Based Storage Management Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21174\" target=\"_blank\" rel=\"noopener\">CVE-2025-21174<\/a><\/td>\n<td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Standards-Based Storage Management Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26680\" target=\"_blank\" rel=\"noopener\">CVE-2025-26680<\/a><\/td>\n<td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Standards-Based Storage Management Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27470\" target=\"_blank\" rel=\"noopener\">CVE-2025-27470<\/a><\/td>\n<td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Standards-Based Storage Management Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26652\" target=\"_blank\" rel=\"noopener\">CVE-2025-26652<\/a><\/td>\n<td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Subsystem for Linux<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26675\" target=\"_blank\" rel=\"noopener\">CVE-2025-26675<\/a><\/td>\n<td>Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows TCP\/IP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26686\" target=\"_blank\" rel=\"noopener\">CVE-2025-26686<\/a><\/td>\n<td>Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Telephony Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27481\" target=\"_blank\" rel=\"noopener\">CVE-2025-27481<\/a><\/td>\n<td>Windows Telephony Service Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Telephony Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21222\" target=\"_blank\" rel=\"noopener\">CVE-2025-21222<\/a><\/td>\n<td>Windows Telephony Service Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Telephony Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21205\" target=\"_blank\" rel=\"noopener\">CVE-2025-21205<\/a><\/td>\n<td>Windows Telephony Service Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Telephony Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21221\" target=\"_blank\" rel=\"noopener\">CVE-2025-21221<\/a><\/td>\n<td>Windows Telephony Service Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Telephony Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27477\" target=\"_blank\" rel=\"noopener\">CVE-2025-27477<\/a><\/td>\n<td>Windows Telephony Service Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27484\" target=\"_blank\" rel=\"noopener\">CVE-2025-27484<\/a><\/td>\n<td>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Update Stack<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21204\" target=\"_blank\" rel=\"noopener\">CVE-2025-21204<\/a><\/td>\n<td>Windows Process Activation Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Update Stack<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27475\" target=\"_blank\" rel=\"noopener\">CVE-2025-27475<\/a><\/td>\n<td>Windows Update Stack Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows upnphost.dll<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26665\" target=\"_blank\" rel=\"noopener\">CVE-2025-26665<\/a><\/td>\n<td>Windows upnphost.dll Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows USB Print Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26639\" target=\"_blank\" rel=\"noopener\">CVE-2025-26639<\/a><\/td>\n<td>Windows USB Print Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Virtualization-Based Security (VBS) Enclave<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27735\" target=\"_blank\" rel=\"noopener\">CVE-2025-27735<\/a><\/td>\n<td>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; GRFX<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27732\" target=\"_blank\" rel=\"noopener\">CVE-2025-27732<\/a><\/td>\n<td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; GRFX<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26687\" target=\"_blank\" rel=\"noopener\">CVE-2025-26687<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; GRFX<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26681\" target=\"_blank\" rel=\"noopener\">CVE-2025-26681<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Microsoft\u2019s April 2025 Patch Tuesday highlights the importance of regular updates in combating cybersecurity threats. With over 134 vulnerabilities addressed, including critical flaws and an actively exploited zero-day vulnerability, applying these patches is essential for safeguarding your systems.<\/p>\n<h2><strong>Similar Posts<\/strong><\/h2>\n<ol>\n<li><a href=\"https:\/\/msftnewsnow.com\/february-2024-patch-tuesday-bolsters\/\" target=\"_blank\" rel=\"noopener\">February 2024 Patch Tuesday bolsters robust security and user control in Windows 11 and Windows 10<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/microsoft-teams-new-copilot-experience\/\" target=\"_blank\" rel=\"noopener\">Teams Boosts Collaboration with AI Copilot, Ends 365 Chat<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/snipping-tool-notepad-windows-insider\/\" target=\"_blank\" rel=\"noopener\">Windows 11\u2019s Snipping Tool and Notepad get a creative overhaul, Insider Preview unveils new markup and AI features<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/apple-tv-apple-music-devices-in-msstore\/\" target=\"_blank\" rel=\"noopener\">Apple looks to replace iTunes with Apple Music, Apple TV, and Apple Devices, now available as standalone apps on Windows 11<\/a><\/li>\n<li><a href=\"https:\/\/msftnewsnow.com\/microsofts-copilot-ai-tool-super-bowl\/\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s Copilot AI tool takes center stage in Super Bowl 2024 ad<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released its April 2025 Patch Tuesday updates, marking one of the most significant security releases of the year. This month\u2019s update addresses 134 vulnerabilities across its software ecosystem, including one actively exploited zero-day vulnerability. As reported by BleepingComputer, theses patches span multiple categories, with 11 critical flaws that demand immediate attention from system &#8230; <a title=\"Microsoft April 2025 Patch Tuesday: Critical Updates Fixing 134 Vulnerabilities, Including a Zero-Day Exploit CVE-2025-29824\" class=\"read-more\" href=\"https:\/\/msftnewsnow.com\/april-2025-patch-tuesday-zero-day-cve-2025-29824\/\" aria-label=\"Read more about Microsoft April 2025 Patch Tuesday: Critical Updates Fixing 134 Vulnerabilities, Including a Zero-Day Exploit CVE-2025-29824\">Read more<\/a><\/p>\n","protected":false},"author":208461344,"featured_media":334870,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[24,2540],"tags":[1173,1081,40,1396,829,1271,1390,778,249,927,930,916,1217,123,32,1083,1267,1188,1171,1275,275,1205,1213,1317,1034],"class_list":["post-334805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-android","tag-apple","tag-azure","tag-bitlocker","tag-copilot","tag-cybersecurity","tag-linux","tag-microsoft","tag-microsoft-edge","tag-microsoft-office","tag-microsoft-word","tag-notepad","tag-onenote","tag-outlook","tag-patch-tuesday","tag-security","tag-settings","tag-sharepoint","tag-snipping-tool","tag-visual-studio","tag-windows","tag-windows-10","tag-windows-11","tag-windows-hello","tag-windows-search"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/msftnewsnow.com\/wp-content\/uploads\/2025\/04\/lead-scaled.jpg","jetpack_shortlink":"https:\/\/wp.me\/pfgCZY-1p65","jetpack-related-posts":[{"id":346470,"url":"https:\/\/msftnewsnow.com\/dmsa-vulnerability-found-in-windows-server-2025\/","url_meta":{"origin":334805,"position":0},"title":"Critical dMSA Vulnerability Found in Windows Server 2025, Dubbed &#8220;BadSuccessor,&#8221; Patch Expected Soon","author":"Dave W. Shanahan","date":"June 6, 2025","format":false,"excerpt":"A newly discovered vulnerability in Windows Server 2025\u2019s delegated Managed Service Account (dMSA) feature has sent shockwaves through the cybersecurity community. Dubbed \u201cBadSuccessor,\u201d this flaw allows attackers with minimal permissions to escalate privileges and potentially compromise entire Active Directory (AD) domains. What Is the dMSA Feature in Windows Server 2025?\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Critical dMSA Vulnerability Found in Windows Server 2025, Dubbed \"BadSuccessor,\" Patch Expected Soon","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-14.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":329309,"url":"https:\/\/msftnewsnow.com\/microsoft-issues-largest-security-update-in-years\/","url_meta":{"origin":334805,"position":1},"title":"Microsoft issues largest security update in years for Patch Tuesday January 2025, patches 3 critical zero-day vulnerabilities","author":"Dave W. Shanahan","date":"January 15, 2025","format":false,"excerpt":"Microsoft has released its first Patch Tuesday update of 2025, addressing a staggering 161 security vulnerabilities - the largest number of fixes in a single month since 2017. As reported by Bleeping Computer, the massive update includes security patches for three actively exploited zero-day flaws and multiple critical vulnerabilities that\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft issues January 2025 largest security updates in years, patches 3 critical zero-day vulnerabilities for January 2025","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":332492,"url":"https:\/\/msftnewsnow.com\/microsofts-march-2025-patch-tuesday-7-zero-days\/","url_meta":{"origin":334805,"position":2},"title":"Microsoft&#8217;s March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws","author":"Dave W. Shanahan","date":"March 12, 2025","format":false,"excerpt":"Microsoft has released its March 2025 Patch Tuesday updates, resolving a total of 57 security vulnerabilities affecting various products, including Windows, Office, Remote Desktop Services, and more. As reported by Bleeping Computer, among these vulnerabilities are seven critical zero-day flaws\u2014six of which were actively exploited in the wild prior to\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft's March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws, CVE-2025-24983, CVE-2025-24991, CVE-2025-24984, CVE-2025-26630, CVE-2025-24985, CVE-2025-24993, CVE-2025-26633, CVE-2025-25001, CVE-2025-25002, CVE-2025-25003, CVE-2025-25004, CVE-2025-25005","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":18938,"url":"https:\/\/msftnewsnow.com\/july-2024-patch-tuesday-update-142-vulnerabilities\/","url_meta":{"origin":334805,"position":3},"title":"Microsoft releases critical July 2024 Patch Tuesday updates, addressing 142 vulnerabilities","author":"Dave W. Shanahan","date":"July 9, 2024","format":false,"excerpt":"The July 2024 Patch Tuesday underscores the ongoing importance of regular security updates in the face of evolving cyber threats. With 142 vulnerabilities addressed, including critical and actively exploited flaws, it's crucial for users and administrators to apply these updates as soon as possible to maintain the security of their\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft releases critical July 2024 Patch Tuesday updates, addressing 142 vulnerabilities","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":350079,"url":"https:\/\/msftnewsnow.com\/july-2025-microsoft-patch-tuesday-vulnerabilities\/","url_meta":{"origin":334805,"position":4},"title":"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws","author":"Dave W. Shanahan","date":"July 8, 2025","format":false,"excerpt":"Microsoft has released its July 2025 Patch Tuesday security updates, addressing a sweeping total of 137 vulnerabilities across its product portfolio. This month\u2019s Microsoft Patch Tuesday cycle is headlined by a publicly disclosed zero-day vulnerability in Microsoft SQL Server, alongside a host of critical flaws in Microsoft Office, SharePoint, and\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":328217,"url":"https:\/\/msftnewsnow.com\/microsoft-december-2024-security-update-zero-day\/","url_meta":{"origin":334805,"position":5},"title":"Microsoft issues critical December 2024 security update to address actively exploited zero-day vulnerability","author":"Dave W. Shanahan","date":"December 12, 2024","format":false,"excerpt":"Microsoft has released its final security patch of 2024, addressing a critical zero-day vulnerability (CVE-2024-49138) that attackers are actively exploiting in the wild. This significant security update, part of December's Patch Tuesday release, fixes 71 vulnerabilities, including 16 rated as critical. Critical zero-day details The actively exploited vulnerability exists in\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft Issues Critical December 2024 Security Update to Address Actively Exploited Zero-Day Vulnerability","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/12\/m5wvgstkttly9mhk2ahm.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/12\/m5wvgstkttly9mhk2ahm.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/12\/m5wvgstkttly9mhk2ahm.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/12\/m5wvgstkttly9mhk2ahm.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/334805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/users\/208461344"}],"replies":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/comments?post=334805"}],"version-history":[{"count":0,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/334805\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media\/334870"}],"wp:attachment":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media?parent=334805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/categories?post=334805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/tags?post=334805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}