top of page

Microsoft Fixes 57 Vulnerabilities, Including 6 Active Zero-Days

Microsoft Addresses New Threats and Advances Security


In March 2025, Microsoft released critical security updates and made significant moves to combat emerging threats in the cybersecurity space. We analyzed how these events relate to the broader cybersecurity landscape and how to mitigate similar risks.


Microsoft Building.
Microsoft Building.

In March 2025, Microsoft released security patches addressing 56 new CVEs across its products, including Windows, Office, Azure, .NET, Remote Desktop Services, DNS Server, and Hyper-V. With the inclusion of third-party vulnerabilities, the total count reached 67 CVEs. Notably, six vulnerabilities were actively exploited at the time of release, emphasizing the urgency for organizations to apply patches immediately.


Key vulnerabilities addressed in this release


Among the most concerning vulnerabilities in this update are:


  • CVE-2025-26633 – Microsoft Management Console (MMC) Security Feature BypassThis vulnerability allows attackers to evade security protections by exploiting flaws in MSC file handling. Once executed, it can bypass file reputation checks, leading to unauthorized code execution. The flaw has been actively exploited by threat actors such as EncryptHub (aka Larva-208), impacting over 600 organizations.


  • CVE-2025-24993 & CVE-2025-24985 – Windows NTFS & Fast FAT File System Remote Code ExecutionAttackers can exploit these vulnerabilities when a victim mounts a specially crafted virtual hard drive (VHD), leading to system compromise. These flaws involve heap-based and integer overflow vulnerabilities, making them particularly dangerous when chained with privilege escalation exploits.


  • CVE-2025-24983 – Win32 Kernel Subsystem Privilege EscalationThis flaw allows attackers to execute malicious code with SYSTEM privileges, enabling full control over an affected system. It is actively exploited in combination with remote code execution vulnerabilities to gain persistent access to networks.


  • CVE-2025-24984 & CVE-2025-24991 – Windows NTFS Information DisclosureThese vulnerabilities expose sensitive memory contents, potentially leaking critical data. One requires physical access to exploit, which is unusual for an active attack, while the other is triggered when mounting a specially crafted VHD.


The exploitation of these vulnerabilities highlights the increasing sophistication of cybercriminal tactics. Unpatched systems remain prime targets, making immediate patch deployment essential.


Check the full list of CVEs released by Microsoft for March 2025 (Source: Microsoft Website)

CVE

Title

Severity

CVSS

Public

Exploited

Type

Microsoft Management Console Security Feature Bypass Vulnerability

Important

7

No

Yes

SFB

Windows Fast FAT File System Driver Remote Code Execution Vulnerability

Important

7.8

No

Yes

RCE

Windows NTFS Information Disclosure Vulnerability

Important

4.6

No

Yes

Info

Windows NTFS Information Disclosure Vulnerability

Important

5.5

No

Yes

Info

Windows NTFS Remote Code Execution Vulnerability

Important

7.8

No

Yes

RCE

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Important

7

No

Yes

EoP

Microsoft Access Remote Code Execution Vulnerability

Important

7.8

Yes

No

RCE

Microsoft Office Remote Code Execution Vulnerability

Critical

7.8

No

No

RCE

Remote Desktop Client Remote Code Execution Vulnerability

Critical

8.8

No

No

RCE

Windows Domain Name Service Remote Code Execution Vulnerability

Critical

8.1

No

No

RCE

Windows Remote Desktop Services Remote Code Execution Vulnerability

Critical

8.1

No

No

RCE

Windows Remote Desktop Services Remote Code Execution Vulnerability

Critical

8.1

No

No

RCE

Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability

Critical

8.4

No

No

RCE

ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability

Important

7

No

No

EoP

Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability

Important

6.7

No

No

EoP

Azure Arc Installer Elevation of Privilege Vulnerability

Important

7

No

No

EoP

Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability

Important

8.4

No

No

EoP

Azure Promptflow Remote Code Execution Vulnerability

Important

6.5

No

No

RCE

DirectX Graphics Kernel File Denial of Service Vulnerability

Important

4.4

No

No

DoS

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Important

8.4

No

No

EoP

Kernel Streaming Service Driver Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

MapUrlToZone Security Feature Bypass Vulnerability

Important

4.3

No

No

SFB

Microsoft Excel Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Excel Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Excel Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Microsoft Office Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Office Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Office Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability

Important

7.3

No

No

EoP

Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability

Important

7.3

No

No

EoP

Microsoft Windows File Explorer Spoofing Vulnerability

Important

7.5

No

No

Spoofing

Microsoft Word Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Microsoft Word Remote Code Execution Vulnerability

Important

7

No

No

RCE

Microsoft Word Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

NTLM Hash Disclosure Spoofing Vulnerability

Important

6.5

No

No

Spoofing

NTLM Hash Disclosure Spoofing Vulnerability

Important

6.5

No

No

Spoofing

Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability

Important

N/A

No

No

RCE

Visual Studio Code Elevation of Privilege Vulnerability

Important

7.3

No

No

EoP

Visual Studio Elevation of Privilege Vulnerability

Important

7.3

No

No

EoP

Visual Studio Installer Elevation of Privilege Vulnerability

Important

7.3

No

No

EoP

WinDbg Remote Code Execution Vulnerability

Important

7.5

No

No

RCE

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Windows exFAT File System Remote Code Execution Vulnerability

Important

7.8

No

No

RCE

Windows Hyper-V Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Windows Hyper-V Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Windows Mark of the Web Security Feature Bypass Vulnerability

Important

7.8

No

No

SFB

Windows NTFS Information Disclosure Vulnerability

Important

5.5

No

No

Info

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Important

8.8

No

No

RCE

Windows Server Elevation of Privilege Vulnerability

Important

7.1

No

No

EoP

Windows Telephony Service Remote Code Execution Vulnerability

Important

8.8

No

No

RCE

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

Important

6.6

No

No

EoP

Windows USB Video Class System Driver Elevation of Privilege Vulnerability

Important

6.6

No

No

EoP

Windows USB Video Class System Driver Information Disclosure Vulnerability

Important

4.3

No

No

Info

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Important

7.8

No

No

EoP

Chromium: CVE-2025-1914 Out of bounds read in V8

High

N/A

No

No

N/A

Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools

Medium

N/A

No

No

N/A

Chromium: CVE-2025-1916 Use after free in Profiles

Medium

N/A

No

No

N/A

Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI

Medium

N/A

No

No

N/A

Chromium: CVE-2025-1918 Out of bounds read in PDFium

Medium

N/A

No

No

N/A

Chromium: CVE-2025-1919 Out of bounds read in Media

Medium

N/A

No

No

N/A

Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream

Medium

N/A

No

No

N/A

Chromium: CVE-2025-1922 Inappropriate Implementation in Selection

Low

N/A

No

No

N/A

Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts

Low

N/A

No

No

N/A

Microsoft Edge (Chromium-based) Spoofing Vulnerability

Low

5.4

No

No

Spoofing

* Indicates this CVE had been released by a third party and is now being included in Microsoft releases.


Cybercriminals Exploit Microsoft Teams for Ransomware


A troubling trend has emerged where cybercriminals are using Microsoft Teams as a tool to launch ransomware attacks. Attackers use social engineering techniques, impersonating IT support staff to gain access to victims’ networks. Once access is granted, they deploy ransomware, which encrypts critical data and demands a ransom for decryption.


The typical attack flow involves:


  • Phishing Campaigns: Attackers initiate the attack by sending a high volume of spam emails, often containing malicious links or attachments.

  • Teams Interaction: Once the attackers gain initial access, they contact the victim on Microsoft Teams, posing as IT personnel offering to fix an issue.

  • Ransomware Deployment: After convincing the employee to allow remote access, attackers deploy ransomware, encrypting files and locking the network.


This method highlights the increasing sophistication of cybercriminal tactics and the need for organizations to be aware of social engineering tactics.


Euroclear and Microsoft Partnership: Strengthening Financial Security


Microsoft has also formed a strategic partnership with Euroclear, a leading financial services company, to enhance its financial infrastructure. This collaboration focuses on integrating Microsoft’s cloud computing, AI, and analytics capabilities to improve operational efficiency and security.


Key elements of this partnership include:


  • AI and Cloud Computing: By utilizing Microsoft’s Azure platform, Euroclear aims to enhance its data processing capabilities, enabling more efficient operations and better client services.

  • Generative AI: AI-driven insights will help Euroclear improve security and resilience across its operations, particularly in handling sensitive financial data.

  • Secure Data Sharing: The partnership will foster a secure data-sharing environment that adheres to global compliance standards, ensuring data privacy while enhancing operational transparency.


This partnership signals the growing role of cloud technologies and AI in securing highly regulated sectors like finance, which face constant cybersecurity threats.


What This Means for cybersecurity Professionals


The evolving landscape of cybersecurity demands that companies (especially cybersecurity professionals) stay ahead of emerging threats. Microsoft’s March 2025 Patch Tuesday update and the exploitation of Microsoft Teams for ransomware attacks underscore the critical need for continuous monitoring, timely patching, and advanced threat detection systems.


Organizations should prioritize the following actions:


  • Timely Patch Management: Apply critical patches, especially those addressing zero-day vulnerabilities, as soon as they are available to reduce the risk of exploitation.

  • Employee Training: Conduct regular training sessions to ensure employees are aware of social engineering tactics and know how to handle suspicious interactions, particularly with IT support requests.

  • Ransomware Defense: Invest in endpoint protection and network detection solutions that can quickly identify and mitigate ransomware threats before they can cause significant damage.

  • Cloud Security: As more organizations adopt cloud solutions, ensuring robust security controls and compliance protocols are in place is essential to safeguarding sensitive data.


How to Create a Robust Management of These Risks



By integrating AI-driven tools and leveraging human expertise in network security, this combination ensures that your organization can quickly respond to and recover from the evolving cybersecurity landscape.



Sources:

bottom of page