{"id":23903,"date":"2025-03-12T13:00:37","date_gmt":"2025-03-12T09:00:37","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23903"},"modified":"2025-03-12T13:00:37","modified_gmt":"2025-03-12T09:00:37","slug":"march-2025-patch-tuesday","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/march-2025-patch-tuesday\/23903\/","title":{"rendered":"Six Microsoft vulnerabilities being actively exploited"},"content":{"rendered":"<p>In its monthly <em>Patch Tuesday<\/em> update, Microsoft has provided patches for six vulnerabilities that are being actively exploited in the wild. Four of these vulnerabilities are related to file systems \u2014 three of which having the same trigger, which may indicate that they\u2019re being used in one and the same attack, or at least by the same actor. The details of their exploitation are still publicly undisclosed (fortunately), but the latest update is highly recommended for immediate installation.<\/p>\n<h2>File system vulnerabilities<\/h2>\n<p>Two of the vulnerabilities were found in the NTFS system. They allow attackers to gain access to parts of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Memory_management#HEAP\" target=\"_blank\" rel=\"nofollow noopener\">heap<\/a> \u2014 that is, to dynamically allocated application memory. Interestingly, the first of them, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24984\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24984<\/a> (4.6 on the CVSS scale), implies physical access of the attacker to the victim\u2019s computer (they need to insert a malicious drive into the USB slot). To exploit the second information disclosure vulnerability, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24991\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24991<\/a> (CVSS 5.5), attackers need to somehow force a local user to mount a malicious virtual hard disk (VHD).<\/p>\n<p>The other two file system vulnerabilities \u2014 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24985\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24985<\/a> in the Fast FAT file system driver, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24993\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24993<\/a> in NTFS \u2014 are triggered in the same way by mounting a VHD prepared by the attackers. However, their exploitation leads to remote execution of arbitrary code on the attacked machine (RCE). Both vulnerabilities have a CVSS rating of 7.8.<\/p>\n<h2>Other exploited vulnerabilities<\/h2>\n<p>The <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24983\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24983<\/a> (CVSS 7.0) vulnerability was found in the Windows Win32 kernel subsystem. It can allow attackers to elevate their privileges to the system level. To exploit it, attackers need to win the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/race-condition\/\" target=\"_blank\" rel=\"noopener\">race condition<\/a>.<\/p>\n<p>The latest vulnerability from the list of actively exploited ones, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-26633\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2025-26633<\/a> (also CVSS 7.0), allows bypassing the security mechanisms of the Microsoft Management Console. The description provides two scenarios for its exploitation; however, both are related to the delivery of a malicious file to the victim, which must then be run. The first scenario involves delivering the file in an email attachment; the second \u2014 delivering a link through an instant messaging program, or, again, via email. According to <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2025\/3\/11\/the-march-2025-security-update-review\" target=\"_blank\" rel=\"nofollow noopener\">information<\/a> from the Zero Day Initiative researchers, who brought this vulnerability to Microsoft\u2019s attention, it\u2019s used by the EncryptHub ransomware group, also known as Larva-208.<\/p>\n<h2>And another zero-day vulnerability<\/h2>\n<p>In addition to the six vulnerabilities used in active attacks, the update from Microsoft also closes <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26630\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26630<\/a> in Microsoft Access, which has not yet been used by attackers \u2014 though it could well be since, according to Microsoft, it\u2019s been publicly known of for some time. This vulnerability has a CVSS rating of 7.8, and its exploitation leads to the execution of arbitrary code. However, the description emphasizes that to exploit it it needs to be opened on the attacked machine, and the Preview Pane is not an attack vector.<\/p>\n<h2>Other vulnerabilities<\/h2>\n<p>The note about the preview mechanism in the description of CVE-2025-26630 is not accidental \u2014 the update also contains a patch for the RCE vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24057\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24057<\/a>, which is quite exploitable through the Preview Pane. In addition, Microsoft closed more vulnerabilities classified as critical, but not yet exploited. All of them also allow remote arbitrary code execution:<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24035\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24035<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24045\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24045<\/a> in the Remote Desktop Service (RDS);<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24057\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24057<\/a> in Microsoft Office;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24084\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24084<\/a> in the Windows Subsystem for Linux \u2014 a feature of Microsoft Windows that allows the use of a Linux environment from within Windows;<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-26645\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-26645<\/a> in the Remote Desktop client. This vulnerability is exploited when the victim connects to a malicious RDP server.<\/li>\n<\/ul>\n<p>We recommend installing updates from Microsoft as soon as possible. Since actively exploited vulnerabilities are most likely used by attackers in fairly complex targeted attacks, we also recommend that companies use modern <a href=\"https:\/\/me-en.kaspersky.com\/next?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____655fe72318f39647\" target=\"_blank\" rel=\"noopener\">security solutions with EDR functionality<\/a>, and, if necessary, involve third-party experts to protect themselves; for example, as part of our <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Managed Detection and Response<\/a> service.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&#8217;s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it&#8217;s worth installing the patches ASAP.<\/p>\n","protected":false},"author":2698,"featured_media":23904,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[38,398,433,268],"class_list":{"0":"post-23903","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-microsoft","11":"tag-patches","12":"tag-ransomware","13":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/march-2025-patch-tuesday\/23903\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/march-2025-patch-tuesday\/28664\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/march-2025-patch-tuesday\/28781\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/march-2025-patch-tuesday\/39224\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/march-2025-patch-tuesday\/53162\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/march-2025-patch-tuesday\/28938\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/march-2025-patch-tuesday\/34731\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/march-2025-patch-tuesday\/34359\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/vulnerabilities\/","name":"vulnerabilities"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2698"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23903"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23903\/revisions"}],"predecessor-version":[{"id":23906,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23903\/revisions\/23906"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23904"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}