Microsoft at present issued greater than 50 safety updates for its varied Home windows working methods, together with fixes for a whopping six zero-day vulnerabilities which are already seeing lively exploitation.
Two of the zero-day flaws embrace CVE-2025-24991 and CVE-2025-24993, each vulnerabilities in NTFS, the default file system for Home windows and Home windows Server. Each require the attacker to trick a goal into mounting a malicious digital arduous disk. CVE-2025-24993 would result in the potential of native code execution, whereas CVE-2025-24991 might trigger NTFS to reveal parts of reminiscence.
Microsoft credit researchers at ESET with reporting the zero-day bug labeled CVE-2025-24983, an elevation of privilege vulnerability in older variations of Home windows. ESET mentioned the exploit was deployed by way of the PipeMagic backdoor, able to exfiltrating information and enabling distant entry to the machine.
ESET’s Filip Jurčacko mentioned the exploit within the wild targets solely older variations of Home windows OS: Home windows 8.1 and Server 2012 R2. Though nonetheless utilized by tens of millions, safety help for these merchandise ended greater than a yr in the past, and mainstream help ended years in the past. Nevertheless, ESET notes the vulnerability itself is also current in newer Home windows OS variations, together with Home windows 10 construct 1809 and the still-supported Home windows Server 2016.
Rapid7’s lead software program engineer Adam Barnett mentioned Home windows 11 and Server 2019 onwards aren’t listed as receiving patches, so are presumably not susceptible.
“It’s not clear why newer Home windows merchandise dodged this specific bullet,” Barnett wrote. “The Home windows 32 subsystem continues to be presumably alive and nicely, since there is no such thing as a obvious point out of its demise on the Home windows consumer OS deprecated options listing.”
The zero-day flaw CVE-2025-24984 is one other NTFS weak spot that may be exploited by inserting a malicious USB drive right into a Home windows pc. Barnett mentioned Microsoft’s advisory for this bug doesn’t fairly be a part of the dots, however profitable exploitation seems to imply that parts of heap reminiscence may very well be improperly dumped right into a log file, which might then be combed by means of by an attacker hungry for privileged data.
“A comparatively low CVSSv3 base rating of 4.6 displays the sensible difficulties of real-world exploitation, however a motivated attacker can generally obtain extraordinary outcomes ranging from the smallest of toeholds, and Microsoft does charge this vulnerability as essential by itself proprietary severity rating scale,” Barnett mentioned.
One other zero-day fastened this month — CVE-2025-24985 — might permit attackers to put in malicious code. As with the NTFS bugs, this one requires that the person mount a malicious digital arduous drive.
The ultimate zero-day this month is CVE-2025-26633, a weak spot within the Microsoft Administration Console, a element of Home windows that offers system directors a technique to configure and monitor the system. Exploiting this flaw requires the goal to open a malicious file.
This month’s bundle of patch love from Redmond additionally addresses six different vulnerabilities Microsoft has rated “crucial,” which means that malware or malcontents might exploit them to grab management over susceptible PCs with no assist from customers.
Barnett noticed that that is now the sixth consecutive month the place Microsoft has revealed zero-day vulnerabilities on Patch Tuesday with out evaluating any of them as crucial severity at time of publication.
The SANS Web Storm Heart has a helpful listing of all of the Microsoft patches launched at present, listed by severity. Home windows enterprise directors would do nicely to regulate askwoody.com, which regularly has the inside track on any patches inflicting issues. Please take into account backing up your information earlier than updating, and go away a remark under for those who expertise any points making use of this month’s updates.