HomeVulnerabilityMicrosoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws

Microsoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws

Right now is Microsoft’s February 2025 Patch Tuesday, which incorporates security updates for 55 flaws, together with 4 zero-day vulnerabilities, with two actively exploited in assaults.

This Patch Tuesday additionally fixes three “Essential” vulnerabilities, all distant code execution vulnerabilities.

The variety of bugs in every vulnerability class is listed under:

  • 19 Elevation of Privilege Vulnerabilities
  • 2 Safety Function Bypass Vulnerabilities
  • 22 Distant Code Execution Vulnerabilities
  • 1 Data Disclosure Vulnerabilities
  • 9 Denial of Service Vulnerabilities
  • 3 Spoofing Vulnerabilities

The above numbers don’t embody a crucial Microsoft Dynamics 365 Gross sales elevation of privileges flaw and 10 Microsoft Edge vulnerabilities mounted on February 6.

To be taught extra concerning the non-security updates launched immediately, you may overview our devoted articles on the Home windows 11 KB5051987 & KB5051989 cumulative updates and the Home windows 10 KB5051974 replace.

Two actively exploited zero-day disclosed

This month’s Patch Tuesday fixes two actively exploited and two publicly uncovered zero-day vulnerabilities.

Microsoft classifies a zero-day flaw as one that’s publicly disclosed or actively exploited whereas no official repair is obtainable.

The actively exploited zero-day vulnerability in immediately’s updates are:

CVE-2025-21391 – Home windows Storage Elevation of Privilege Vulnerability

Microsoft has mounted an actively exploited elevation of privileges vulnerability that can be utilized to delete recordsdata.

“An attacker would solely be capable to delete focused recordsdata on a system,” reads Microsoft’s advisory.

“This vulnerability doesn’t enable disclosure of any confidential info, however might enable an attacker to delete knowledge that would embody knowledge that leads to the service being unavailable,” continued Microsoft.

No info has been launched about how this flaw was exploited in assaults and who disclosed it.

CVE-2025-21418 – Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability

The second actively exploited vulnerability permits risk actors to achieve SYSTEM privileges in Home windows.

It’s unknown the way it was utilized in assaults, and Microsoft says this flaw was disclosed anonymously.

The publicly disclosed zero-days are:

CVE-2025-21194 – Microsoft Floor Safety Function Bypass Vulnerability

Microsoft says that this flaw is a hypervisor vulnerability that enables assaults to bypass UEFI and compromise the safe kernel.

“This Hypervisor vulnerability pertains to Digital Machines inside a Unified Extensible Firmware Interface (UEFI) host machine,” explains Microsoft’s advisory.

“On some particular {hardware} it may be attainable to bypass the UEFI, which might result in the compromise of the hypervisor and the safe kernel.”

Microsoft says that Francisco Falcón and Iván Arce of Quarkslab found the vulnerability.

Whereas Microsoft didn’t share many particulars concerning the flaw, it’s probably related to the PixieFail flaws disclosed by the researchers final month. 

PixieFail is a set of 9 vulnerabilities that influence the IPv6 community protocol stack of Tianocore’s EDK II, which is utilized by Microsoft Floor and the corporate’s hypervisor merchandise.

See also  New Menace Actor Makes use of Open-Supply Instruments for Widespread Attacks

CVE-2025-21377 – NTLM Hash Disclosure Spoofing Vulnerability

Microsoft mounted a publicly disclosed bug that exposes a Window person’s NTLM hashes, permitting a distant attacker to probably log in because the person.

“Minimal interplay with a malicious file by a person akin to deciding on (single-click), inspecting (right-click), or performing an motion apart from opening or executing the file might set off this vulnerability.” explains Microsoft’s advisory.

Whereas Microsoft has not shared many particulars concerning the flaw, it probably acts like different NTLM hash disclosure flaws, the place merely interacting with a file relatively than opening it might trigger Home windows to remotely connect with a distant share. When doing so, an NTLM negotiation passes the person’s NTLM hash to the distant server, which the attacker can acquire.

These NTLM hashes can then be cracked to get the plain-text password or utilized in pass-the-hash assaults.

Microsoft says this flaw was found by Owen Cheung, Ivan Sheung, and Vincent Yau with Cathay Pacific, Yorick Koster of Securify B.V., and Blaz Satler with 0patch by ACROS Safety.

Latest updates from different corporations

Different distributors who launched updates or advisories in February 2025 embody:

  • Adobe launched security updates for quite a few merchandise, together with Adobe Photoshop, Substance3D, Illustrator, and Animate.
  • ​AMD launched mitigations and firmware updates to handle a vulnerability that may be exploited to load malicious CPU microcode.
  • Apple launched a security replace for a zero-day exploited in ‘extraordinarily refined’ assaults.
  • Cisco launched security updates for a number of merchandise, together with Cisco IOS, ISE, NX-OS, and Id Companies.
  • Google mounted an actively exploited zero-day flaw in Android Kernel’s USB Video Class driver.
  • Ivanti launched security updates for Join Safe, Neurons for MDM, and Cloud Service Software.
  • Fortinet launched security updates for quite a few merchandise, together with FortiManager, FortiOS, FortiAnalyzer, and FortiSwitchManager.
  • Netgear mounted two crucial vulnerabilities affecting a number of WiFi router fashions.
  • SAP releases security updates for a number of merchandise.

The February 2025 Patch Tuesday Safety Updates

Beneath is the entire record of resolved vulnerabilities within the February 2025 Patch Tuesday updates.

To entry the total description of every vulnerability and the techniques it impacts, you may view the full report right here.

Tag CVE ID CVE Title Severity
Energetic Listing Area Companies CVE-2025-21351 Home windows Energetic Listing Area Companies API Denial of Service Vulnerability Vital
Azure Community Watcher CVE-2025-21188 Azure Community Watcher VM Extension Elevation of Privilege Vulnerability Vital
Microsoft AutoUpdate (MAU) CVE-2025-24036 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability Vital
Microsoft Digest Authentication CVE-2025-21368 Microsoft Digest Authentication Distant Code Execution Vulnerability Vital
Microsoft Digest Authentication CVE-2025-21369 Microsoft Digest Authentication Distant Code Execution Vulnerability Vital
Microsoft Dynamics 365 Gross sales CVE-2025-21177 Microsoft Dynamics 365 Gross sales Elevation of Privilege Vulnerability Essential
Microsoft Edge (Chromium-based) CVE-2025-21267 Microsoft Edge (Chromium-based) Spoofing Vulnerability Low
Microsoft Edge (Chromium-based) CVE-2025-21279 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability Vital
Microsoft Edge (Chromium-based) CVE-2025-21342 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability Vital
Microsoft Edge (Chromium-based) CVE-2025-0445 Chromium: CVE-2025-0445 Use after free in V8 Unknown
Microsoft Edge (Chromium-based) CVE-2025-0451 Chromium: CVE-2025-0451 Inappropriate implementation in Extensions API Unknown
Microsoft Edge (Chromium-based) CVE-2025-0444 Chromium: CVE-2025-0444 Use after free in Skia Unknown
Microsoft Edge (Chromium-based) CVE-2025-21283 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability Vital
Microsoft Edge (Chromium-based) CVE-2025-21404 Microsoft Edge (Chromium-based) Spoofing Vulnerability Low
Microsoft Edge (Chromium-based) CVE-2025-21408 Microsoft Edge (Chromium-based) Distant Code Execution Vulnerability Vital
Microsoft Edge for iOS and Android CVE-2025-21253 Microsoft Edge for IOS and Android Spoofing Vulnerability Reasonable
Microsoft Excessive Efficiency Compute Pack (HPC) Linux Node Agent CVE-2025-21198 Microsoft Excessive Efficiency Compute (HPC) Pack Distant Code Execution Vulnerability Vital
Microsoft Workplace CVE-2025-21392 Microsoft Workplace Distant Code Execution Vulnerability Vital
Microsoft Workplace CVE-2025-21397 Microsoft Workplace Distant Code Execution Vulnerability Vital
Microsoft Workplace Excel CVE-2025-21381 Microsoft Excel Distant Code Execution Vulnerability Essential
Microsoft Workplace Excel CVE-2025-21394 Microsoft Excel Distant Code Execution Vulnerability Vital
Microsoft Workplace Excel CVE-2025-21383 Microsoft Excel Data Disclosure Vulnerability Vital
Microsoft Workplace Excel CVE-2025-21390 Microsoft Excel Distant Code Execution Vulnerability Vital
Microsoft Workplace Excel CVE-2025-21386 Microsoft Excel Distant Code Execution Vulnerability Vital
Microsoft Workplace Excel CVE-2025-21387 Microsoft Excel Distant Code Execution Vulnerability Vital
Microsoft Workplace SharePoint CVE-2025-21400 Microsoft SharePoint Server Distant Code Execution Vulnerability Vital
Microsoft PC Supervisor CVE-2025-21322 Microsoft PC Supervisor Elevation of Privilege Vulnerability Vital
Microsoft Streaming Service CVE-2025-21375 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Vital
Microsoft Floor CVE-2025-21194 Microsoft Floor Safety Function Bypass Vulnerability Vital
Microsoft Home windows CVE-2025-21337 Home windows NTFS Elevation of Privilege Vulnerability Vital
Open Supply Software program CVE-2023-32002 HackerOne: CVE-2023-32002 Node.js `Module._load()` coverage Distant Code Execution Vulnerability Vital
Outlook for Android CVE-2025-21259 Microsoft Outlook Spoofing Vulnerability Vital
Visible Studio CVE-2025-21206 Visible Studio Installer Elevation of Privilege Vulnerability Vital
Visible Studio Code CVE-2025-24039 Visible Studio Code Elevation of Privilege Vulnerability Vital
Visible Studio Code CVE-2025-24042 Visible Studio Code JS Debug Extension Elevation of Privilege Vulnerability Vital
Home windows Ancillary Perform Driver for WinSock CVE-2025-21418 Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability Vital
Home windows CoreMessaging CVE-2025-21358 Home windows Core Messaging Elevation of Privileges Vulnerability Vital
Home windows CoreMessaging CVE-2025-21184 Home windows Core Messaging Elevation of Privileges Vulnerability Vital
Home windows DHCP Consumer CVE-2025-21179 DHCP Consumer Service Denial of Service Vulnerability Vital
Home windows DHCP Server CVE-2025-21379 DHCP Consumer Service Distant Code Execution Vulnerability Essential
Home windows Disk Cleanup Software CVE-2025-21420 Home windows Disk Cleanup Software Elevation of Privilege Vulnerability Vital
Home windows DWM Core Library CVE-2025-21414 Home windows Core Messaging Elevation of Privileges Vulnerability Vital
Home windows Installer CVE-2025-21373 Home windows Installer Elevation of Privilege Vulnerability Vital
Home windows Web Connection Sharing (ICS) CVE-2025-21216 Web Connection Sharing (ICS) Denial of Service Vulnerability Vital
Home windows Web Connection Sharing (ICS) CVE-2025-21212 Web Connection Sharing (ICS) Denial of Service Vulnerability Vital
Home windows Web Connection Sharing (ICS) CVE-2025-21352 Web Connection Sharing (ICS) Denial of Service Vulnerability Vital
Home windows Web Connection Sharing (ICS) CVE-2025-21254 Web Connection Sharing (ICS) Denial of Service Vulnerability Vital
Home windows Kerberos CVE-2025-21350 Home windows Kerberos Denial of Service Vulnerability Vital
Home windows Kernel CVE-2025-21359 Home windows Kernel Safety Function Bypass Vulnerability Vital
Home windows LDAP – Light-weight Listing Entry Protocol CVE-2025-21376 Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability Essential
Home windows Message Queuing CVE-2025-21181 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability Vital
Home windows NTLM CVE-2025-21377 NTLM Hash Disclosure Spoofing Vulnerability Vital
Home windows Distant Desktop Companies CVE-2025-21349 Home windows Distant Desktop Configuration Service Tampering Vulnerability Vital
Home windows Resilient File System (ReFS) Deduplication Service CVE-2025-21183 Home windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability Vital
Home windows Resilient File System (ReFS) Deduplication Service CVE-2025-21182 Home windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability Vital
Home windows Routing and Distant Entry Service (RRAS) CVE-2025-21410 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability Vital
Home windows Routing and Distant Entry Service (RRAS) CVE-2025-21208 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability Vital
Home windows Setup Recordsdata Cleanup CVE-2025-21419 Home windows Setup Recordsdata Cleanup Elevation of Privilege Vulnerability Vital
Home windows Storage CVE-2025-21391 Home windows Storage Elevation of Privilege Vulnerability Vital
Home windows Telephony Server CVE-2025-21201 Home windows Telephony Server Distant Code Execution Vulnerability Vital
Home windows Telephony Service CVE-2025-21407 Home windows Telephony Service Distant Code Execution Vulnerability Vital
Home windows Telephony Service CVE-2025-21406 Home windows Telephony Service Distant Code Execution Vulnerability Vital
Home windows Telephony Service CVE-2025-21200 Home windows Telephony Service Distant Code Execution Vulnerability Vital
Home windows Telephony Service CVE-2025-21371 Home windows Telephony Service Distant Code Execution Vulnerability Vital
Home windows Telephony Service CVE-2025-21190 Home windows Telephony Service Distant Code Execution Vulnerability Vital
Home windows Replace Stack CVE-2025-21347 Home windows Deployment Companies Denial of Service Vulnerability Vital
Home windows Win32 Kernel Subsystem CVE-2025-21367 Home windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Vital
See also  Crucial bug in ownCloud file sharing app exposes admin passwords
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular