Patch Tuesday: Microsoft Fixes 57 Safety Flaws


Photo of SF Bently.
Picture: Microsoft Information

Microsoft simply dropped its March 2025 Patch Tuesday replace, which incorporates 57 fixes although nearer to 70 with third-party vulnerabilities included. The replace addresses some essential safety points that require quick consideration, together with the next six zero-day vulnerabilities that hackers are actively exploiting.

  • CVE-2025-26633: A safety gap in Microsoft Administration Console that lets hackers bypass regular protections. They sometimes trick you into opening a specifically designed file or web site by way of e-mail or messaging apps. Rated Vital, with a hazard rating of seven.8 out of 10. “In an e-mail or on the spot message assault situation, the attacker might ship the focused consumer a specifically crafted file that’s designed to take advantage of the vulnerability,” explains Microsoft. “In any case an attacker would haven’t any method to power a consumer to view attacker-controlled content material. As a substitute, an attacker must persuade a consumer to take motion. For instance, an attacker might entice a consumer to both click on a hyperlink that directs the consumer to the attacker’s web site or ship a malicious attachment.”
  • CVE-2025-24993: A reminiscence bug in Home windows that enables hackers to run no matter code they need in your pc. Although Microsoft calls this “distant,” somebody or one thing must be bodily at your pc to take advantage of it. Hazard rating: 7.8. “An attacker can trick an area consumer on a weak system into mounting a specifically crafted VHD that may then set off the vulnerability,” explains Microsoft.
  • CVE-2025-24991: A Home windows flaw that lets attackers peek at small bits of your pc’s reminiscence. They’d must trick you into opening a particular type of disk picture file. Reasonable hazard at 5.5.
  • CVE-2025-24985: A math error in Home windows’ file system that lets attackers run malicious code in your pc. They’d want you to open a dangerous disk picture file first. Hazard rating: 7.8.
  • CVE-2025-24984: A Home windows bug that unintentionally writes delicate data to log information. Hackers would wish bodily entry to your pc to plug in a malicious USB drive. Decrease threat at 4.6.
  • CVE-2025-24983: A Home windows flaw that lets somebody with entry to your pc achieve full system management by exploiting a timing vulnerability. Hazard rating: 7.0.

There’s a seventh vulnerability – a distant code execution bug in Home windows Entry – that’s been made public however doesn’t appear to be actively exploited but.

True to kind, Microsoft saved with custom and didn’t share any digital fingerprints that might assist safety groups spot in the event that they’ve been hit.

Extra safety vulnerabilities together with in Distant Desktop Consumer

Microsoft additionally highlighted a number of nasty bugs that might permit attackers to run malicious code over networks. The scariest half is that they will do that with no need consumer interplay.

One standout is CVE-2025-26645, a path traversal vulnerability in Distant Desktop Consumer. This one is a doozy as a result of should you connect with a compromised Distant Desktop Server utilizing a weak shopper, the attacker might instantly execute code in your pc. Catastrophe.

Microsoft strongly suggested Home windows directors to prioritize patching essential distant code execution vulnerabilities affecting Home windows Subsystem for Linux, Home windows DNS Server, Distant Desktop Service, and Microsoft Workplace.

Obtain our customizable patch administration coverage, written by Scott Matteson for TechRepublic Premium, which gives tips for the suitable software of patches in a corporation.

This text was written by TechnologyAdvice contributing author Allison Francis.

Leave a Reply

Your email address will not be published. Required fields are marked *