Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days 
  • Security Week

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days 

Ryan Naraine Published: March 11, 2025 | Updated: March 11, 2025 3 min read
0 views

For the second month in a row, Microsoft’s Patch Tuesday updates landed with warnings that a half-dozen Windows security defects have already been exploited in the wild.

Redmond’s security response team slapped “exploitation detected” tags on six of the 57 security vulnerabilities patched this month and pushed Windows admins to prioritize another large batch of code execution flaws.

The latest exploited zero-days were addressed in the  Microsoft Management Console, Windows NTFS, the Fast FAT File System Driver, and the Win32 Kernel Subsystem.

According to Microsoft documentation, the exploited bugs allow security features bypass, remote code execution, privilege escalate via memory corruption issues.

Here’s a list of the exploited zero-days:

  • CVE-2025-26633 — Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file or website that is designed to exploit the vulnerability. User interaction is required. Important, CVSS 7.8/10.
  • CVE-2025-24993 — Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. According to Microsoft, “remote” refers to the location of the attacker. “The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.” CVSS 7.8.
  • CVE-2025-24991 — Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally. An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. CVSS 5.5.
  • CVE-2025-24985 — Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. CVSS 7.8.
  • CVE-2025-24984 — Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. An attacker needs physical access to the target computer to plug in a malicious USB drive to potentially read portions of heap memory.  CVSS 4.6.
  • CVE-2025-24983 — Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. Successful exploitation of this vulnerability requires an attacker to win a race condition to gain SYSTEM privileges. CVSS 7.0.

As is customary, the company did not publicly release IOCs to help defenders hunt for signs of infections.

In addition to the exploited bugs, Microsoft called immediate attention to multiple critical-severity bugs that, in some cases, allow remote code execution over the network. 

These include CVE-2025-26645, documented as a relative path traversal in Remote Desktop Client that allows an unauthorized attacker to execute code over a network. “In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client,” Microsoft warned.  

Redmond also urged Windows sysadmins to prioritize critical, code execution bugs in the Windows Subsystem for Linux, the Windows DNS Server, Windows Remote Desktop Service and Microsoft Office. 

Advertisement. Scroll to continue reading.

Related: Patch Tuesday: Microsoft Warns of Exploited Windows Zero-Days 

Related: Remote Code Execution Flaw in Microsoft Message Queuing

Related: Microsoft Warns of Under-Attack Windows Kernel Flaw

Related: Microsoft Flags Major Bugs in HyperV, Exchange Server 

Related: Microsoft Patches ‘Wormable’ Windows Flaw and File-Deleting Zero-Day

About The Author

Ryan Naraine

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Alleged Co-Founder of Garantex Arrested in India
Next: Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw

Author's Other Posts

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities Cybersecurity_News-SecurityWeek.jpg

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities

April 14, 2025 0 0
Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed Nvidia.jpeg

Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed

April 14, 2025 0 1
Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle Ivanti-e1736941837602.jpg

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

April 11, 2025 0 0
Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs White-House-Cybersecurity.jpg

Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs

April 10, 2025 0 0

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.