Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

MICROSOFT'S PATCH TUESDAY REVEALS SIX CRITICAL FLAWS AND COUNTING


Microsoft's Patch Tuesday has revealed six critical flaws and counting, including a heap-based buffer overflow in NTFS and vulnerabilities in Remote Desktop Services. With malicious actors already exploiting these issues, it is essential that users take proactive steps to ensure their security measures are up-to-date.

  • Microsoft patched 57 vulnerabilities, including a serious heap-based buffer overflow vulnerability rated 7.8 on the CVSS severity scale.
  • A local exploit requires tricking a user into mounting a malicious virtual hard disk image to successfully exploit the vulnerability.
  • CVE-2025-26645 allows an unauthorized attacker to execute code over a network via relative path traversal when connecting to a malicious Remote Desktop Protocol server.
  • Microsoft also addressed six other critical flaws, including a use-after-free() flaw in Windows DNS Server and a Windows Subsystem for Linux kernel remote code execution vulnerability.
  • Exploits often rely on human error or social engineering tactics, and can be carried out without access to the target system itself.



  • In a typical month, Patch Tuesday brings with it a flurry of security updates from some of the world's most prominent technology companies. However, this latest installment has brought more than just minor bug fixes to the table. According to recent reports, Microsoft has patched an astonishing 57 vulnerabilities in its software, with six of them already being exploited by malicious actors.

    At the forefront of these patches is a heap-based buffer overflow in NTFS used by Windows Server 2008 and later systems, as well as Windows 10 and 11. CVE-2025-24993, as it has been designated, is rated 7.8 on the CVSS severity scale, making it a serious concern for anyone with access to vulnerable systems. Microsoft warns that this type of exploit requires local action – in other words, an attacker must trick a local user into mounting a malicious virtual hard disk image before they can successfully exploit the vulnerability.

    The issue has already been reported anonymously, and experts warn that once exploited, it could lead to remote code execution. The attack itself is carried out locally, meaning that an attacker needs to have physical access to the target system in order to carry out the exploitation.

    Another critical flaw in this patch bundle is CVE-2025-26645, a 8.8-rated vulnerability in Remote Desktop Client that allows an unauthorized attacker to execute code over a network via relative path traversal when a vulnerable client connects to a malicious remote desktop protocol server. This type of attack can have far-reaching consequences for organizations with systems that rely on Remote Desktop Services.

    In addition to these exploits, Microsoft has also addressed six other critical flaws in its software, including a use-after-free() flaw in Windows DNS Server and a Windows Subsystem for Linux kernel remote code execution vulnerability. The latter two are rated 8.1 on the CVSS scale and make them equally concerning for those responsible for managing vulnerable systems.

    It's worth noting that Microsoft has been quite proactive about addressing these vulnerabilities, with many of them receiving patches in this month's Patch Tuesday bundle. However, it also serves as a sobering reminder that even the most robust security measures can be breached if an attacker is able to find and exploit a zero-day vulnerability.

    The exploits being carried out by malicious actors are often the result of human error or social engineering tactics. In other words, many of these types of attacks do not require access to the target system itself but rather rely on convincing users to take specific actions that ultimately lead to exploitation.

    Meanwhile, Apple has also released a patch for CVE-2025-24201, which is an issue that allows attackers to bypass the Web Content sandbox in Safari and execute arbitrary code on a target system. This vulnerability has already been exploited in targeted attacks against individuals with versions of iOS before 17.2, according to reports from Cupertino.

    Adobe has also released patches for nine vulnerabilities this month, including six critical flaws that allow arbitrary code execution. These issues span across its software suite, including Photoshop and Illustrator. Meanwhile, Google has pushed out an update for Android, which addresses two under-attack vulnerabilities by miscreants.

    With the number of vulnerable systems in use increasing exponentially, it is essential that users take proactive steps to ensure their security measures are up-to-date. This includes regularly checking for available patches, applying them promptly, and maintaining a robust antivirus program.

    In conclusion, this latest Patch Tuesday bundle serves as a stark reminder of the importance of staying vigilant against cyber threats. As technology advances at an unprecedented pace, it is crucial that we prioritize our digital security in order to mitigate these types of vulnerabilities before they can be exploited.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/MICROSOFTS-PATCH-TUESDAY-REVEALS-SIX-CRITICAL-FLAWS-AND-COUNTING-ehn.shtml

  • Published: Tue Mar 11 21:48:32 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us