Microsoft March 2025 Patch Tuesday: Fixes for 57 Vulnerabilities & 6 Actively Exploited Zero-Days

Microsoft’s March 2025 Patch Tuesday addresses 57 vulnerabilities, including six zero-day vulnerabilities that are currently being exploited. The security update includes fixes for Windows, Microsoft Office, Azure, and other components. The March patch tuesday update included fixes for: In addition to the zero-day flaws, this Patch Tuesday includes fixes for: Zero-Day Vulnerabilities A zero-day vulnerability […] The post Microsoft March 2025 Patch Tuesday: Fixes for 57 Vulnerabilities & 6 Actively Exploited Zero-Days appeared first on Cyber Security News.

Mar 12, 2025 - 11:03
 0
Microsoft March 2025 Patch Tuesday: Fixes for 57 Vulnerabilities & 6 Actively Exploited Zero-Days

Microsoft’s March 2025 Patch Tuesday addresses 57 vulnerabilities, including six zero-day vulnerabilities that are currently being exploited. The security update includes fixes for Windows, Microsoft Office, Azure, and other components.

The March patch tuesday update included fixes for:

In addition to the zero-day flaws, this Patch Tuesday includes fixes for:

  • 23 Elevation of Privilege Vulnerabilities
  • 3 Security Feature Bypass Vulnerabilities
  • 23 Remote Code Execution Vulnerabilities
  • 4 Information Disclosure Vulnerabilities
  • 1 Denial of Service Vulnerabilities
  • 3 Spoofing Vulnerabilities

Zero-Day Vulnerabilities

A zero-day vulnerability is one that is actively exploited or publicly disclosed before an official patch is available1. This month’s Patch Tuesday addresses six actively exploited zero-day flaws and one that has been publicly exposed1.

The actively exploited zero-day vulnerabilities included in today’s updates are:

  • CVE-2025-24983Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability This vulnerability allows a local attacker to gain SYSTEM privileges on a device after winning a race condition. Filip Jurčacko reported it from ESET, who found that the exploit was deployed via the PipeMagic backdoor and targeted older Windows versions, such as Windows 8.1 and Server 2012 R2. The vulnerability is also present in newer Windows OS versions, including Windows 10 build 1809 and Windows Server 2016.
  • CVE-2025-24984Windows NTFS Information Disclosure Vulnerability Attackers with physical access to a device can exploit this vulnerability by inserting a malicious USB drive to read portions of heap memory and steal information.
  • CVE-2025-24985Windows Fast FAT File System Driver Remote Code Execution Vulnerability This vulnerability is a combination of integer overflow and heap-based buffer overflow defects in the Windows Fast FAT File System Driver.
  • CVE-2025-24991Windows NTFS Information Disclosure Vulnerability
  • CVE-2025-24993Windows NTFS Remote Code Execution Vulnerability An attacker could exploit these vulnerabilities by tricking a target into mounting a malicious virtual hard disk, which could lead to local code execution or disclosure of memory contents.
  • CVE-2025-26633Microsoft Management Console Security Feature Bypass Vulnerability Exploitation requires user interaction, where an attacker must convince a user to click a malicious link or open a malicious file to circumvent security restrictions and gain unauthorized access to administrative tools or system settings.

Other Important Vulnerabilities

Some of the critical vulnerabilities that have been fixed this month include:

  • CVE-2025-24045 and CVE-2025-24035 These are two critical vulnerabilities in Windows Remote Desktop Services (RDS). An attacker could exploit these vulnerabilities by connecting to a system with the Remote Desktop Gateway role, triggering a race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.
  • CVE-2025-24044 – Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerabilities A local, authenticated attacker would need to win a race condition in order to exploit this vulnerability. Successful exploitation of the vulnerability would allow the attacker to gain SYSTEM privileges.
  • CVE-2025-24064 – Windows Domain Name Service Remote Code Execution Vulnerability
  • CVE-2025-24084 – Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability

Microsoft March 2025 Patch Tuesday Vulnerabilities List

TagCVE IDCVE TitleSeverity
Microsoft OfficeCVE-2025-24057Microsoft Office Remote Code Execution VulnerabilityCritical
Remote Desktop ClientCVE-2025-26645Remote Desktop Client Remote Code Execution VulnerabilityCritical
Role: DNS ServerCVE-2025-24064Windows Domain Name Service Remote Code Execution VulnerabilityCritical
Windows Remote Desktop ServicesCVE-2025-24035Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Remote Desktop ServicesCVE-2025-24045Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Subsystem for LinuxCVE-2025-24084Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution VulnerabilityCritical
.NETCVE-2025-24043WinDbg Remote Code Execution VulnerabilityImportant
ASP.NET Core & Visual StudioCVE-2025-24070ASP.NET Core and Visual Studio Elevation of Privilege VulnerabilityImportant
Azure Agent InstallerCVE-2025-21199Azure Agent Installer for Backup and Site Recovery Elevation of Privilege VulnerabilityImportant
Azure ArcCVE-2025-26627Azure Arc Installer Elevation of Privilege VulnerabilityImportant
Azure CLICVE-2025-24049Azure Command Line Integration (CLI) Elevation of Privilege VulnerabilityImportant
Azure PromptFlowCVE-2025-24986Azure Promptflow Remote Code Execution VulnerabilityImportant
Kernel Streaming WOW Thunk Service DriverCVE-2025-24995Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft Local Security Authority Server (lsasrv)CVE-2025-24072Microsoft Local Security Authority (LSA) Server Elevation of Privilege VulnerabilityImportant
Microsoft Management ConsoleCVE-2025-26633Microsoft Management Console Security Feature Bypass VulnerabilityImportant
Microsoft OfficeCVE-2025-24083Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-26629Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-24080Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft Office AccessCVE-2025-26630Microsoft Access Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24081Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24082Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24075Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24077Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24078Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24079Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-24046Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-24067Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2025-25008Windows Server Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2024-9157Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-24048Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-24050Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-24998Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-25003Visual Studio Elevation of Privilege VulnerabilityImportant
Visual Studio CodeCVE-2025-26631Visual Studio Code Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2025-24059Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cross Device ServiceCVE-2025-24994Microsoft Windows Cross Device Service Elevation of Privilege VulnerabilityImportant
Windows Cross Device ServiceCVE-2025-24076Microsoft Windows Cross Device Service Elevation of Privilege VulnerabilityImportant
Windows exFAT File SystemCVE-2025-21180Windows exFAT File System Remote Code Execution VulnerabilityImportant
Windows Fast FAT DriverCVE-2025-24985Windows Fast FAT File System Driver Remote Code Execution VulnerabilityImportant
Windows File ExplorerCVE-2025-24071Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows Kernel MemoryCVE-2025-24997DirectX Graphics Kernel File Denial of Service VulnerabilityImportant
Windows Kernel-Mode DriversCVE-2025-24066Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-21247MapUrlToZone Security Feature Bypass VulnerabilityImportant
Windows Mark of the Web (MOTW)CVE-2025-24061Windows Mark of the Web Security Feature Bypass VulnerabilityImportant
Windows NTFSCVE-2025-24993Windows NTFS Remote Code Execution VulnerabilityImportant
Windows NTFSCVE-2025-24984Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-24992Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-24991Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTLMCVE-2025-24996NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows NTLMCVE-2025-24054NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-24051Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Telephony ServerCVE-2025-24056Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows USB Video DriverCVE-2025-24988Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2025-24987Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2025-24055Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
Windows Win32 Kernel SubsystemCVE-2025-24044Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant
Windows Win32 Kernel SubsystemCVE-2025-24983Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant

This ensures that all Critical vulnerabilities are prioritized at the top, followed by Important ones. Let me know if you need any modifications!

Given the number of actively exploited vulnerabilities, system administrators must apply these patches as soon as possible to protect their systems from potential attacks.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

The post Microsoft March 2025 Patch Tuesday: Fixes for 57 Vulnerabilities & 6 Actively Exploited Zero-Days appeared first on Cyber Security News.