Microsoft’s March 2025 Patch Tuesday Addresses Six Actively Exploited Zero-Day Vulnerabilities

Microsoft has released its March 2025 Patch Tuesday update, addressing 57 vulnerabilities, including six actively exploited zero-day flaws in Windows and NTFS.

Microsoft has released its monthly security updates, addressing a total of 57 vulnerabilities across its software suite. Notably, this update includes fixes for six zero-day vulnerabilities that have been actively exploited in the wild, underscoring the critical need for users and organizations to apply these patches promptly.

The March 2025 Patch Tuesday addresses a variety of vulnerabilities: 

  • Elevation of Privilege (EoP): 23 vulnerabilities 
  • Remote Code Execution (RCE): 23 vulnerabilities 
  • Spoofing: 3 vulnerabilities 
  • Information Disclosure: 4 vulnerabilities 
  • Security Feature Bypass: 3 vulnerabilities 
  • Denial of Service (DoS): 1 vulnerability
  • Among these, six are classified as critical, primarily due to their potential for remote code execution, allowing attackers to run malicious code on unpatched systems.

Details on Actively Exploited Zero-Day Vulnerabilities

Microsoft’s March 2025 security update addresses six zero-day vulnerabilities that have been actively exploited in the wild, affecting key components within the Windows ecosystem and posing severe security risks if left unpatched.

The first of these, CVE-2025-26633, is a security feature bypass vulnerability within the Microsoft Management Console (MMC). This flaw allows an attacker to manipulate a user into opening a malicious file, potentially leading to unauthorized system actions. The exploit operates by leveraging security oversights within MMC’s handling of certain files. This is not an isolated incident for the MMC; it marks the second instance of an actively exploited zero-day vulnerability in this component, following CVE-2024-43572, which was addressed in October 2024. The recurrence of similar vulnerabilities in MMC highlights ongoing security concerns with this core Windows feature.

CVE-2025-24985 involves a remote code execution vulnerability within the Windows Fast FAT File System Driver. This flaw enables attackers to execute arbitrary code on a target system if they can convince a user to mount a specially crafted virtual hard disk (VHD). By exploiting the vulnerability, an attacker can gain full control of the system, enabling further malicious activity such as data theft or installation of malware. Notably, this is the first reported vulnerability in this component since 2022 and also the first known instance of its exploitation as a zero-day. The targeting of this subsystem highlights the increasing focus by threat actors on less monitored parts of Windows infrastructure.

The third actively exploited vulnerability, CVE-2025-24983, affects the Windows Win32 Kernel Subsystem. This elevation of privilege flaw enables an authenticated attacker to gain SYSTEM-level privileges by successfully winning a race condition. SYSTEM privileges grant attackers the highest level of access within Windows, allowing for full control of the machine. The exploit’s complexity lies in the timing precision required to manipulate system processes. This vulnerability is particularly severe, as it marks the first recorded zero-day exploit within the Win32 Kernel Subsystem, underscoring how attackers are targeting foundational elements of Windows’ architecture.

CVE-2025-24993 is a remote code execution vulnerability within the Windows New Technology File System (NTFS). It involves a heap-based buffer overflow, which can be triggered when a local user mounts a specially crafted VHD. If successfully exploited, it enables arbitrary code execution on the affected system. This vulnerability’s reliance on social engineering—enticing users to mount malicious VHDs—demonstrates the persistent risk posed by human interaction in cybersecurity breaches. The fact that it has already been exploited in the wild as a zero-day adds urgency to the need for patching.

Another NTFS vulnerability, CVE-2025-24991, facilitates information disclosure. This flaw allows an attacker to perform an out-of-bounds read, potentially exposing sensitive data. However, successful exploitation requires the victim to mount a crafted VHD, illustrating the vulnerability’s dependency on specific user actions. While its potential impact is lower than that of remote code execution, information disclosure can serve as a precursor to more severe attacks if sensitive data is compromised.

The final zero-day addressed, CVE-2025-24984, is another information disclosure vulnerability within NTFS. Unlike the previous vulnerability, this flaw enables attackers to insert sensitive information into log files. It requires physical access to the targeted machine, which somewhat limits its exploitation scope. However, in scenarios where physical access is possible, this vulnerability poses a substantial security risk by compromising data integrity and confidentiality.

Recommended Actions for Users and Administrators

Given the active exploitation of these zero-day vulnerabilities, immediate action is critical to mitigate potential risks. First and foremost, all systems should be updated with the latest security patches provided by Microsoft. Detailed information and update instructions are available on Microsoft’s official support page. Prompt patching significantly reduces exposure to these and similar threats, ensuring that systems are safeguarded against known exploits.

Organizations should prioritize the patching of critical systems, particularly those containing sensitive information or those exposed to external networks. Systems that manage core operations, data storage, or communications are especially vulnerable and should be addressed with urgency. Delays in patching such systems could result in exploitation, leading to data breaches or operational disruption.

Additionally, reviewing and strengthening security configurations is essential. This involves conducting regular security audits, ensuring configurations align with industry best practices, and adjusting settings to minimize potential attack vectors. Implementing security measures like strict user permissions, controlled access to external drives, and enhanced monitoring of system logs can significantly reduce the likelihood of successful attacks.

By adhering to these recommendations, organizations and users can reduce their exposure to ongoing threats and protect critical systems from being compromised. Vigilance and timely action remain the most effective defenses against the evolving landscape of cybersecurity threats.

Complete List of Microsoft March 2025 Security Updates

ProductCVE IDCVE TitleSeverity
Microsoft OfficeCVE-2025-24057Microsoft Office Remote Code Execution VulnerabilityCritical
Remote Desktop ClientCVE-2025-26645Remote Desktop Client Remote Code Execution VulnerabilityCritical
Role: DNS ServerCVE-2025-24064Windows Domain Name Service Remote Code Execution VulnerabilityCritical
Windows Remote Desktop ServicesCVE-2025-24035Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Remote Desktop ServicesCVE-2025-24045Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Subsystem for LinuxCVE-2025-24084Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution VulnerabilityCritical
.NETCVE-2025-24043WinDbg Remote Code Execution VulnerabilityImportant
ASP.NET Core & Visual StudioCVE-2025-24070ASP.NET Core and Visual Studio Elevation of Privilege VulnerabilityImportant
Azure Agent InstallerCVE-2025-21199Azure Agent Installer for Backup and Site Recovery Elevation of Privilege VulnerabilityImportant
Azure ArcCVE-2025-26627Azure Arc Installer Elevation of Privilege VulnerabilityImportant
Azure CLICVE-2025-24049Azure Command Line Integration (CLI) Elevation of Privilege VulnerabilityImportant
Azure PromptFlowCVE-2025-24986Azure Promptflow Remote Code Execution VulnerabilityImportant
Kernel Streaming WOW Thunk Service DriverCVE-2025-24995Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft Local Security Authority Server (lsasrv)CVE-2025-24072Microsoft Local Security Authority (LSA) Server Elevation of Privilege VulnerabilityImportant
Microsoft Management ConsoleCVE-2025-26633Microsoft Management Console Security Feature Bypass VulnerabilityImportant
Microsoft OfficeCVE-2025-24083Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-26629Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-24080Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft Office AccessCVE-2025-26630Microsoft Access Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24081Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24082Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-24075Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24077Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24078Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-24079Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-24046Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-24067Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2025-25008Windows Server Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2024-9157Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-24048Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-24050Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-24998Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-25003Visual Studio Elevation of Privilege VulnerabilityImportant
Visual Studio CodeCVE-2025-26631Visual Studio Code Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2025-24059Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cross Device ServiceCVE-2025-24994Microsoft Windows Cross Device Service Elevation of Privilege VulnerabilityImportant
Windows Cross Device ServiceCVE-2025-24076Microsoft Windows Cross Device Service Elevation of Privilege VulnerabilityImportant
Windows exFAT File SystemCVE-2025-21180Windows exFAT File System Remote Code Execution VulnerabilityImportant
Windows Fast FAT DriverCVE-2025-24985Windows Fast FAT File System Driver Remote Code Execution VulnerabilityImportant
Windows File ExplorerCVE-2025-24071Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows Kernel MemoryCVE-2025-24997DirectX Graphics Kernel File Denial of Service VulnerabilityImportant
Windows Kernel-Mode DriversCVE-2025-24066Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-21247MapUrlToZone Security Feature Bypass VulnerabilityImportant
Windows Mark of the Web (MOTW)CVE-2025-24061Windows Mark of the Web Security Feature Bypass VulnerabilityImportant
Windows NTFSCVE-2025-24993Windows NTFS Remote Code Execution VulnerabilityImportant
Windows NTFSCVE-2025-24984Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-24992Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-24991Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTLMCVE-2025-24996NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows NTLMCVE-2025-24054NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-24051Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Telephony ServerCVE-2025-24056Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows USB Video DriverCVE-2025-24988Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2025-24987Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2025-24055Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
Windows Win32 Kernel SubsystemCVE-2025-24044Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant
Windows Win32 Kernel SubsystemCVE-2025-24983Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant
Markus Kasanmascheff
Markus Kasanmascheff
Markus has been covering the tech industry for more than 15 years. He is holding a Master´s degree in International Economics and is the founder and managing editor of Winbuzzer.com.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
0
We would love to hear your opinion! Please comment below.x
()
x