Cyber Security News

Microsoft Patch Tuesday March 2025 – 6 Actively Exploited Zero-Days & 57 Vulnerabilities Are Fixed

Microsoft has rolled out its March 2025 Patch Tuesday update, addressing a total of 57 vulnerabilities across its software ecosystem, including 6 actively exploited Zero-day vulnerabilities.

This release includes fixes for:

  • 23 Remote Code Execution Vulnerabilities
  • 23 Elevation of Privilege Vulnerabilities
  • 3 Security Feature Bypass Vulnerabilities
  • 4 Information Disclosure Vulnerabilities
  • 3 Spoofing Vulnerabilities
  • 1 Denial of Service Vulnerability

Issued on the second Tuesday of each month, this update is vital for users and administrators, as attackers are already exploiting several of these flaws in the wild.

Below is a detailed look at the six zero-day vulnerabilities patched in this release, alongside the broader scope of the update.

Zero-Day Vulnerabilities

CVE-2025-24983: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

This zero-day allows local attackers to escalate privileges to SYSTEM level by winning a race condition.

Discovered by Filip Jurčacko of ESET, this use-after-free flaw stems from improper memory management, enabling attackers to execute malicious code on already compromised systems.

While Microsoft has not disclosed specific attack details, ESET is expected to release further insights, highlighting the severity of this privilege escalation threat.

CVE-2025-24984: Windows NTFS Information Disclosure Vulnerability

Attackers with physical access to a device can exploit this vulnerability by inserting a malicious USB drive, allowing them to read portions of heap memory and extract sensitive information.

Reported anonymously, this flaw poses a significant risk in environments where physical security is not tightly controlled, emphasizing the need for robust endpoint protection.

CVE-2025-24985: Windows Fast FAT File System Driver Remote Code Execution Vulnerability

Caused by an integer overflow and heap-based buffer overflow in the Windows Fast FAT Driver, this vulnerability enables remote code execution.

Attackers can exploit it by tricking users into mounting a specially crafted virtual hard disk (VHD), a tactic previously seen in phishing campaigns and pirated software distribution.

Microsoft notes this flaw, also anonymously disclosed, underscores the dangers of unverified file sources.

CVE-2025-24991: Windows NTFS Information Disclosure Vulnerability

Similar to CVE-2025-24984, this flaw allows attackers to access small portions of heap memory by convincing a user to mount a malicious VHD file.

Disclosed anonymously, it highlights a recurring vulnerability in the NTFS system, potentially exposing sensitive data to attackers who can socially engineer their targets effectively.

CVE-2025-24993: Windows NTFS Remote Code Execution Vulnerability

This zero-day involves a heap-based buffer overflow in the NTFS system, enabling attackers to execute code remotely.

Like CVE-2025-24985, exploitation requires a user to mount a malicious VHD, making it a potent threat in targeted attacks.

Reported anonymously, it reinforces the critical need for user awareness and timely patching.

CVE-2025-26633: Microsoft Management Console Security Feature Bypass Vulnerability

This vulnerability allows attackers to bypass security features in the Microsoft Management Console by tricking users into interacting with malicious files or links.

Though specific exploitation details are limited, this anonymously reported flaw could grant unauthorized access to administrative tools, amplifying its potential impact when paired with other exploits.

In addition to these zero-days, the update addresses a seventh zero-day that was publicly disclosed but not actively exploited.

With 57 total fixes, including critical remote code execution flaws, Microsoft urges immediate deployment to mitigate ongoing threats.

The high number of actively exploited vulnerabilities suggests advanced threat actors are already leveraging these weaknesses, making this Patch Tuesday a pivotal moment for cybersecurity in 2025.

Microsoft Patch Tuesday March 2025 Vulnerabilities List

TagCVE IDCVE TitleSeverity
Microsoft OfficeCVE-2025-24057Microsoft Office Remote Code Execution VulnerabilityCritical
Remote Desktop ClientCVE-2025-26645Remote Desktop Client Remote Code Execution VulnerabilityCritical
Role: DNS ServerCVE-2025-24064Windows Domain Name Service Remote Code Execution VulnerabilityCritical
Windows Remote Desktop ServicesCVE-2025-24035Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Remote Desktop ServicesCVE-2025-24045Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Subsystem for LinuxCVE-2025-24084Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution VulnerabilityCritical
.NETCVE-2025-24043WinDbg Remote Code Execution VulnerabilityImportant
ASP.NET Core & Visual StudioCVE-2025-24070ASP.NET Core and Visual Studio Elevation of Privilege VulnerabilityImportant
Azure Agent InstallerCVE-2025-21199Azure Agent Installer for Backup and Site Recovery Elevation of Privilege VulnerabilityImportant
Azure ArcCVE-2025-26627Azure Arc Installer Elevation of Privilege VulnerabilityImportant
Azure CLICVE-2025-24049Azure Command Line Integration (CLI) Elevation of Privilege VulnerabilityImportant
Azure PromptFlowCVE-2025-24986Azure Promptflow Remote Code Execution VulnerabilityImportant
Kernel Streaming WOW Thunk Service DriverCVE-2025-24995Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft Local Security Authority Server (lsasrv)CVE-2025-24072Microsoft Local Security Authority (LSA) Server Elevation of Privilege VulnerabilityImportant
Microsoft Management ConsoleCVE-2025-26633Microsoft Management Console Security Feature Bypass VulnerabilityImportant
Microsoft OfficeCVE-2025-24083Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-26629Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-24080Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft Office AccessCVE-2025-26630Microsoft Access Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24081Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24082Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24075Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24077Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24078Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24079Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-24046Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-24067Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2025-25008Windows Server Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2024-9157Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-24048Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-24050Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-24998Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-25003Visual Studio Elevation of Privilege VulnerabilityImportant
Visual Studio CodeCVE-2025-26631Visual Studio Code Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2025-24059Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cross Device ServiceCVE-2025-24994Microsoft Windows Cross Device Service Elevation of Privilege VulnerabilityImportant
Windows Cross Device ServiceCVE-2025-24076Microsoft Windows Cross Device Service Elevation of Privilege VulnerabilityImportant
Windows exFAT File SystemCVE-2025-21180Windows exFAT File System Remote Code Execution VulnerabilityImportant
Windows Fast FAT DriverCVE-2025-24985Windows Fast FAT File System Driver Remote Code Execution VulnerabilityImportant
Windows File ExplorerCVE-2025-24071Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows Kernel MemoryCVE-2025-24997DirectX Graphics Kernel File Denial of Service VulnerabilityImportant
Windows Kernel-Mode DriversCVE-2025-24066Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-21247MapUrlToZone Security Feature Bypass VulnerabilityImportant
Windows Mark of the Web (MOTW)CVE-2025-24061Windows Mark of the Web Security Feature Bypass VulnerabilityImportant
Windows NTFSCVE-2025-24993Windows NTFS Remote Code Execution VulnerabilityImportant
Windows NTFSCVE-2025-24984Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-24992Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-24991Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTLMCVE-2025-24996NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows NTLMCVE-2025-24054NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-24051Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Telephony ServerCVE-2025-24056Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows USB Video DriverCVE-2025-24988Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2025-24987Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2025-24055Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
Windows Win32 Kernel SubsystemCVE-2025-24044Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant
Windows Win32 Kernel SubsystemCVE-2025-24983Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant

How to Update

Users and administrators can apply these updates via:

  1. Windows Update: Navigate to Settings > Update & Security > Windows Update and check for updates.
  2. Microsoft Update Catalog: Download individual patches for offline installation.
  3. WSUS (Windows Server Update Services): For enterprise environments, managing updates centrally.

Microsoft’s March 2025 Patch Tuesday underscores the growing complexity of cybersecurity threats facing organizations today.

The critical nature of several vulnerabilities makes it imperative for IT teams to act swiftly in deploying these fixes. As always, users are encouraged to remain vigilant against phishing attempts and other attack vectors that might exploit unpatched systems.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

CYREBRO’s AI-Native MDR Platform Earns Silver at the 2025 Globee Cybersecurity Awards

CYREBRO, the AI-native Managed Detection and Response (MDR) solution, announced today that it won Silver…

2 hours ago

Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation

Aptori’s AI-Driven AppSec Platform Proactively Eliminates Vulnerabilities to Minimize Risk and Ensure Compliance. Aptori, a…

2 hours ago

MirrorFace APT Using Custom Malware To Exploited Windows Sandbox & Visual Studio Code

The cybersecurity landscape witnessed a significant development when the National Police Agency (NPA) and the…

2 hours ago

CISA Issues Advisory on Windows NTFS Flaw Enabling Local Code Execution

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding a significant…

2 hours ago

CISA Issues Security Alert on Windows NTFS Exploit Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a recently…

3 hours ago

CISA Warns of Exploitable Fast FAT Vulnerability in Microsoft Windows

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a critical vulnerability…

3 hours ago