Microsoft’s Newest Replace Patches 57 Safety Vulnerabilities



Microsoft’s launched its month-to-month Patch Tuesday replace for March 2025 to repair 57 bugs throughout Home windows, Workplace, Azure, and different Microsoft programs. Seven of the patches tackle zero-day vulnerabilities, six of which have been actively exploited.

In line with Bleeping Laptop, this month’s replace fixes 23 elevation of privilege flaws, three safety function bypass flaws, 23 distant code execution flaws, 4 data disclosure flaws, one denial of service flaw, and three spoofing flaws. Microsoft additionally launched patches to quite a few vulnerabilities in Mariner and Microsoft Edge this month.

Patch Tuesday fixes for March

Seven of the issues fastened have been zero-day vulnerabilities, which permit dangerous actors to use programs earlier than an official patch is launched by builders. On this case, six of the seven zero-day vulnerabilities have been actively exploited, whereas one was publicly uncovered—so it is solely a matter of time earlier than actors exploit this seventh vulnerability, as nicely.

Two of the six lively exploits (CVE-2025-24985 and CVE-2025-24993) are distant code execution vulnerabilities, via which attackers trick customers into mounting a malicious VHD file to run code remotely. One impacts the Home windows Quick FAT System Driver, whereas the opposite is a flaw in Home windows NTFS.

Two of the lively exploits are data disclosure vulnerabilities, each in Home windows NTFS. CVE-2025-24984 permits dangerous actors with bodily entry to a tool to learn reminiscence and steal knowledge when a malicious USB drive is inserted, whereas CVE-2025-24991 is exploited when a consumer mounts a malicious VHD file.

Lastly, there’s CVE-2025-24983, a vulnerability within the Home windows Win32 Kernel Subsystem that enables native attackers to achieve system privileges on a tool, and CVE-2025-26633, a safety function bypass vulnerability within the Microsoft Administration Console.

Microsoft says many of the exploited zero-days flaws have been disclosed anonymously, although CVE-2025-24983 was recognized by ESET and CVE-2025-26633 by Development Micro.

The publicly disclosed zero-day—labeled CVE-2025-26630 and found by Unpatched.ai—permits distant code execution in Microsoft Workplace Entry if the consumer opens a file despatched through a phishing or social engineering assault. Microsoft additionally launched patches for six different “essential” vulnerabilities affecting Microsoft Workplace, Distant Desktop Consumer, Home windows Area Title Service, Home windows Distant Desktop Companies, and Home windows Subsystem for Linux Kernel.

How one can set up Microsoft’s newest safety updates

Microsoft releases its Patch Tuesday fixes on the second Tuesday of each month at 10 a.m. PT and pushes notifications and safety updates to customers if wanted. Home windows and Microsoft safety updates usually obtain and set up mechanically in your PC. To make sure your PC is up to date, go to Begin > Settings > Home windows Replace, and choose Verify for Home windows updates.



Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top