Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Nvidia DLSS 4 transformer model exits beta, set to bring improved graphics to more games

    Study shows gaming can reduce stress, even the violent kind

    Hackers show how they can fully control your 2020 Nissan Leaf remotely

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      On-Chain Data Shows the Real Story Behind Iran’s $90 Million Nobitex Hack

      June 26, 2025

      European Commission to Loosen MiCA Rules Despite ECB Warnings

      June 26, 2025

      Trump Family’s World Liberty Financial To Make WLFI Token Tradable

      June 26, 2025

      US Housing Giants To Consider Crypto In Mortgage Loan Assessments

      June 26, 2025

      Content Tokenization Could be the Next Biggest AI Trend – Here’s Why

      June 26, 2025
    • Technology

      Nvidia DLSS 4 transformer model exits beta, set to bring improved graphics to more games

      June 26, 2025

      Study shows gaming can reduce stress, even the violent kind

      June 26, 2025

      Hackers show how they can fully control your 2020 Nissan Leaf remotely

      June 26, 2025

      How PC makers exploited BIOS copyright strings to unlock trial software during the Windows 95 era

      June 26, 2025

      Which operating system was targeted by the first ever mobile phone virus?

      June 26, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»March Patch Tuesday brings 57 fixes, multiple zero-days
    Technology

    March Patch Tuesday brings 57 fixes, multiple zero-days

    TechAiVerseBy TechAiVerseMarch 12, 2025No Comments5 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    March Patch Tuesday brings 57 fixes, multiple zero-days
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    March Patch Tuesday brings 57 fixes, multiple zero-days

    The third Patch Tuesday of 2025 brings fixes for 57 flaws and a hefty number of zero-days

    By

    • Alex Scroxton,
      Security Editor

    Published: 11 Mar 2025 20:32

    Microsoft has dropped a grand total of 57 fixes to mark the third Patch Tuesday update of 2025 – rising to closer to 70 when third-party vulns are taken into account – including six zero-days and six critical flaws needing urgent attention.

    The zero-days comprise a security feature bypass in Microsoft Management Console, two remote code execution (RCE) issues in Windows Fast FAT File System Driver and Windows NTFS, two information disclosure vulnerabilities in Windows NTFS, and a privilege escalation flaw in Windows Win32 Kernel Subsystem.

    All are listed as exploited by Microsoft, but have not yet been made public, and all are considered to be important in their severity, carrying CVSS scores that range from 4.6 to 7.8.

    A seventh vulnerability, an RCE issue in Windows Access, has been listed as public but does not appear to be actively exploited at the time of writing.

    The six critical vulnerabilities, carrying CVSS scores of 7.8 through 8.8, are all RCE flaws. Two of them affect Windows Remote Desktop Services, and the four others relate to Microsoft Office, Windows Domain Name Service, Remote Desktop Client, and Windows Subsystem for Linux Kernel.

    “All six of the vulnerabilities that Microsoft has labelled as exploit detected are resolved with the monthly cumulative update,” said Tyler Reguly, Fortra associate director of security research and development.

    “This means a single update to roll out to fix all of these at once. Thankfully, none of them require post-patch configuration steps. The same is true for five of the six critical severity vulnerabilities. A lot of our important fixes come from the same patch.

    “The remaining critical vulnerability, CVE-2025-24057, and the publicly disclosed vulnerability, CVE-2025-26630, both require Office updates. For those running click-to-run, there’s not a lot to do, but for those running Office 2016, there are two patches to install, one for Office and one for Access,” he added.

    Reguly said that fortunately, this limited the amount of patching needed to resolve the attention-grabbing flaws. “However,” he said, “they are big ticket items and with headlines likely to state, Microsoft patches six zero-day vulnerabilities, admins will likely have a lot of questions to answer about the state of their patching.”

    Big ticket items: big impacts

    Assessing these big ticket items in a little more depth, Immersive senior director of threat research, Kev Breen said the NTFS and FAT RCE flaws probably warrant the greatest attention. These flaws form part of a chain with the two NTFS information disclosure vulnerabilities.

    “These four CVEs are all related to a remote code execution vulnerability that is associated with mounting Virtual Hard Disk (VHD) files. These are tracked separately as CVE-2025-24984, CVE-2025-24985, CVE-2025-24991, and CVE-2025-24993, so when it comes to patch management ensure all four are covered.

    Breen explained that the exploit chain relies on the attacker convincing a user to open or mount a virtual hard disk (VHD) file. These are typically used to store operating systems for virtual machines and while more usually associated with VMs, there have been cases down through the years where such files have been used to smuggle malware payloads onto target systems.

    “Depending on the configuration of Windows systems, simply double-clicking on a VHD file could be enough to mount the container and, therefore, execute any payloads contained within the malicious file,” said Breen. “Organisations should check their security tools for any VHD files being sent via email or downloaded from the internet and look to add security rules or blocks for these file types where they are not required.”

    Meanwhile, Alex Vovk, CEO and co-founder of Action1, considered some of the implications of the Windows Win32 Kernel EoP flaw, tracked as CVE-2025-24984.

    “CVE-2025-24983 provides a direct path from low privileges to SYSTEM access, making it an attractive target for attackers with initial access via phishing, malware, compromised credentials or insider threats,” said Vovk.

    “Although classified as high complexity, well-resourced attackers – including state-sponsored groups and cyber criminal organisations – have historically overcome such constraints through automation and repeated attempts. Race-condition vulnerabilities in kernel subsystems have proven to be reliably exploitable, given sufficient attacker persistence and environment predictability.   

    “Organisations heavily dependent on Windows infrastructure – including enterprises, governments, and critical infrastructure sectors – are at risk. Kernel-level privilege escalation vulnerabilities remain highly valuable to attackers, as they serve as a key pivot point in advanced cyber attacks, enabling deeper network infiltration and persistent access,” said Vovk.

    Read more on Application security and coding requirements


    • March Patch Tuesday fixes 6 Windows zero-day exploits

      By: Tom Walat


    • Fortinet discloses second authentication bypass vulnerability

      By: Alexander Culafi


    • Microsoft’s February 2025 Patch Tuesday corrects 57 bugs, three critical

      By: Brian McKenna


    • Microsoft plugs two zero-days for February Patch Tuesday

      By: Tom Walat

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMusk claims of Ukraine DDoS attack derided by cyber community
    Next Article Report hails benefits of ‘socially integrating’ datacentres into local communities
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Nvidia DLSS 4 transformer model exits beta, set to bring improved graphics to more games

    June 26, 2025

    Study shows gaming can reduce stress, even the violent kind

    June 26, 2025

    Hackers show how they can fully control your 2020 Nissan Leaf remotely

    June 26, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202525 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202516 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 26, 2025

    Nvidia DLSS 4 transformer model exits beta, set to bring improved graphics to more games

    Nvidia DLSS 4 transformer model exits beta, set to bring improved graphics to more games…

    Study shows gaming can reduce stress, even the violent kind

    Hackers show how they can fully control your 2020 Nissan Leaf remotely

    How PC makers exploited BIOS copyright strings to unlock trial software during the Windows 95 era

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Nvidia DLSS 4 transformer model exits beta, set to bring improved graphics to more games

    June 26, 20250 Views

    Study shows gaming can reduce stress, even the violent kind

    June 26, 20250 Views

    Hackers show how they can fully control your 2020 Nissan Leaf remotely

    June 26, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.