Cyber Security News

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing a wide range of vulnerabilities across its products and services.

This month’s release includes fixes for critical remote code execution (RCE) vulnerabilities, elevation of privilege flaws, and other security issues that attackers could potentially exploit.

Organizations and users are urged to apply these updates promptly to safeguard their systems.

Vulnerability Breakdown

The February update included fixes for:

  • 25 Remote Code Execution vulnerabilities
  • 14 Elevation of Privilege vulnerabilities
  • 6 Denial of Service vulnerabilities
  • 4 Security Feature Bypass vulnerabilities
  • 2 Spoofing vulnerabilities
  • 1 Information Disclosure vulnerability

Microsoft Patch Tuesday, February 2025

This month’s update addresses over 61 vulnerabilities, including critical and important issues. The most notable fixes include:

Critical Vulnerabilities

CVE-2025-21376 – This critical vulnerability could allow attackers to execute arbitrary code remotely by exploiting the LDAP protocol. Organizations relying on LDAP services are strongly advised to prioritize this update.

CVE-2025-21379 – A flaw in the DHCP client service could enable attackers to compromise systems via specially crafted network packets. This vulnerability is classified as critical due to its potential for remote exploitation.

CVE-2025-21381, CVE-2025-21386, CVE-2025-21387 – Multiple vulnerabilities in Microsoft Excel could allow malicious actors to execute code by convincing users to open specially crafted files.

CVE-2025-21406, CVE-2025-21407 – These vulnerabilities affect the Windows Telephony Service and could be exploited remotely to execute arbitrary code.

Exploited in the Wild

Two vulnerabilities patched this month have been confirmed as actively exploited:

CVE-2023-24932 – An attacker could bypass Secure Boot protections, potentially compromising the integrity of boot processes.

CVE-2025-21391 – This vulnerability allows attackers to gain elevated privileges on affected systems.

CVE-2025-21418 – An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

Other Notable Fixes

  • Visual Studio Remote Code Execution (CVE-2025-21176, CVE-2025-21178): Developers using Visual Studio should apply these updates immediately to mitigate potential RCE risks.
  • Azure Network Watcher VM Extension Elevation of Privilege (CVE-2025-21188): Cloud administrators are advised to address this vulnerability impacting Azure environments.
  • Microsoft Office RCE Vulnerabilities (CVE-2025-21392, CVE-2025-21397): These flaws could be exploited via malicious Office documents.

Many of the vulnerabilities addressed this month have a high impact, including remote code execution and elevation of privilege flaws that could allow attackers to take control of affected systems or escalate their access within networks.

Here’s a structured table of 61 vulnerabilities addressed in Microsoft’s February 2025 Patch Tuesday, derived from the provided CSV data and search results.

CVE IDTitleImpactSeverityExploited
CVE-2025-21376Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityRemote Code ExecutionCriticalNo
CVE-2025-21379DHCP Client Service Remote Code Execution VulnerabilityRemote Code ExecutionCriticalNo
CVE-2025-21381Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionCriticalNo
CVE-2023-24932Secure Boot Security Feature Bypass VulnerabilitySecurity Feature BypassImportantYes
CVE-2025-21176.NET, .NET Framework, and Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21178Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21172.NET and Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21188Azure Network Watcher VM Extension Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21206Visual Studio Installer Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21351Windows Active Directory Domain Services API Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21352Internet Connection Sharing (ICS) Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21368Microsoft Digest Authentication Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21369Microsoft Digest Authentication Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21375Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21383Microsoft Excel Information Disclosure VulnerabilityInformation DisclosureImportantNo
CVE-2025-21182Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21183Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21391Windows Storage Elevation of Privilege VulnerabilityElevation of PrivilegeImportantYes
CVE-2025-21418Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of PrivilegeImportantYes
CVE-2025-21419Windows Setup Files Cleanup Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21420Windows Disk Cleanup Tool Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2023-32002Node.js Module._load() Policy Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-24036Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-24039Visual Studio Code Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21259Microsoft Outlook Spoofing VulnerabilitySpoofingImportantNo
CVE-2025-21194Microsoft Surface Security Feature Bypass VulnerabilitySecurity Feature BypassImportantNo
CVE-2025-21208Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21406Windows Telephony Service Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21407Windows Telephony Service Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21410Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21190Windows Telephony Service Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21200Windows Telephony Service Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21201Windows Telephony Server Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21198Microsoft High Performance Compute (HPC) Pack Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21337Windows NTFS Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21347Windows Deployment Services Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21349Windows Remote Desktop Configuration Service Tampering VulnerabilityTamperingImportantNo
CVE-2025-21350Windows Kerberos Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21358Windows Core Messaging Elevation of Privileges VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21359Windows Kernel Security Feature Bypass VulnerabilitySecurity Feature BypassImportantNo
CVE-2025-21367Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21371Windows Telephony Service Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21377NTLM Hash Disclosure Spoofing VulnerabilitySpoofingImportantNo
CVE-2025-21386Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21387Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21390Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21392Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21394Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21397Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21400Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportantNo
CVE-2025-21179DHCP Client Service Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21181Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21184Windows Core Messaging Elevation of Privileges VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21212Internet Connection Sharing (ICS) Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21216Internet Connection Sharing (ICS) Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21254Internet Connection Sharing (ICS) Denial of Service VulnerabilityDenial of ServiceImportantNo
CVE-2025-21322Microsoft PC Manager Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21414Windows Core Messaging Elevation of Privileges VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-21373Windows Installer Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo
CVE-2025-24042Visual Studio Code JS Debug Extension Elevation of Privilege VulnerabilityElevation of PrivilegeImportantNo

With two vulnerabilities already being exploited in the wild, delaying updates could leave systems exposed to active threats.

Microsoft has also emphasized the importance of installing the latest servicing stack updates (ADV990001) to ensure smooth deployment of security patches.

How to Update

Users and administrators can apply these updates via:

  1. Windows Update: Navigate to Settings > Update & Security > Windows Update and check for updates.
  2. Microsoft Update Catalog: Download individual patches for offline installation.
  3. WSUS (Windows Server Update Services): For enterprise environments, managing updates centrally.

Microsoft’s February 2025 Patch Tuesday underscores the growing complexity of cybersecurity threats facing organizations today.

The critical nature of several vulnerabilities makes it imperative for IT teams to act swiftly in deploying these fixes. As always, users are encouraged to remain vigilant against phishing attempts and other attack vectors that might exploit unpatched systems.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication bypass…

28 seconds ago

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the risks…

3 hours ago

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals. Among these,…

3 hours ago

Satellite Weather Software Vulnerabilities Let Attackers Execute Code Remotely

IBL Software Engineering has disclosed a significant security vulnerability, identified as CVE-2025-1077, affecting its Visual…

3 hours ago

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in…

8 hours ago

New York Bans DeepSeek Over Potential Data Risks

 New York Governor Kathy Hochul announced that the state has banned the use of the…

8 hours ago