Friday, April 18, 2025
HomeCyber SecurityMicrosoft Fixes 134 Vulnerabilities, Together with 1 Zero-Day

Microsoft Fixes 134 Vulnerabilities, Together with 1 Zero-Day


Photo of Microsoft CEO Satya Nadella.
Microsoft CEO Satya Nadella. Picture: Microsoft Information

Microsoft’s Patch Tuesday safety replace for April included 134 flaws, one among which is an actively exploited zero-day flaw.

The safety patches for Home windows 10 have been unavailable when the Home windows 11 patches have been launched. The Home windows 10 patches have since arrived, however the delay was uncommon.

Tyler Reguly, affiliate director of safety R&D at world cybersecurity software program and providers supplier Fortra, instructed in an electronic mail to TechRepublic that the 2 separate releases and a 40-minute delay within the Home windows 11 replace may level to one thing uncommon behind the scenes.

SEE: What’s Patch Tuesday? Microsoft’s Month-to-month Replace Defined

CVE-2025-29824 has been detected within the wild

The zero-day vulnerability was CVE-2025-29824, an elevation of privilege bug within the Home windows Widespread Log File System (CLFS) Driver.

“This vulnerability is critical as a result of it impacts a core element of Home windows, impacting a variety of environments, together with enterprise methods and significant infrastructure,” Mike Walters, president and co-founder of patch automation firm Motion, wrote in an electronic mail. “If exploited, it permits privilege escalation to SYSTEM degree—the very best privilege on a Home windows system.”

Elevation of privilege assaults require the risk actor to have a foothold within the system first.

“Elevation of privilege flaws in CLFS have grow to be particularly in style amongst ransomware operators over time,” Satnam Narang, Tenable’s senior workers analysis engineer, mentioned in an electronic mail.

“What makes this vulnerability notably regarding is that Microsoft has confirmed lively exploitation within the wild, but presently, no patch has been launched for Home windows 10 32-bit or 64-bit methods,” Ben McCarthy, lead cybersecurity engineer at safety coaching firm Immersive, added. “The dearth of a patch leaves a essential hole in protection for a large portion of the Home windows ecosystem.”

The delayed rollout of Home windows 10 patches — paired with a 40-minute delay within the Home windows 11 replace — provides additional weight to issues about inside disruptions or challenges at Microsoft. Whereas the rationale for the delay stays unclear, safety researchers are paying attention to the timing, notably given the lively exploitation of CVE-2025-29824.

CVE-2025-29824 has been exploited towards “a small variety of targets” in “organizations within the info expertise (IT) and actual property sectors of the USA, the monetary sector in Venezuela, a Spanish software program firm, and the retail sector in Saudi Arabia,” Microsoft disclosed.

“I used to be just lately discussing CLFS vulnerabilities and the way they appear to return in waves,” Reguly famous. “When a vulnerability in CLFS is patched, individuals are inclined to dig round and have a look at what’s happening and are available throughout different vulnerabilities within the course of. If I used to be a gambler, I might guess on CLFS showing once more subsequent month.”

Distant code execution and Microsoft Workplace flaws are frequent patterns

Different notable elements of April’s Patch Tuesday embrace a repair for CVE-2025-26663, a essential flaw that might have an effect on organizations operating Home windows Light-weight Listing Entry Protocol (LDAP) servers.

Reguly highlighted CVE-2025-27472, a vulnerability in Mark of the Internet (MOTW) that Microsoft listed as Exploitation Extra Probably.  “It is not uncommon to see MOTW vulnerabilities utilized by risk actors,” he mentioned. “I wouldn’t be shocked if this can be a vulnerability that we see exploited sooner or later.”

SEE: Select the appropriate safety purposes for what you are promoting by balancing options, knowledge storage, and value. 

Microsoft launched a number of patches for CVEs in Workplace (CVE-2025-29791, CVE-2025-27749, CVE-2025-27748, and CVE-2025-27745). Microsoft Workplace’s reputation means these vulnerabilities have the potential for widespread issues, though all of them require profitable social engineering or distant code execution to inject a malicious file.

Whereas a few of these CVEs enabled distant code execution (RCE), this month’s Patch Tuesday advised a unique story total.

“For the primary time since August 2024, Patch Tuesday vulnerabilities skewed extra in the direction of elevation of privilege bugs, which accounted for over 40% (49) of all patched vulnerabilities,” Narang mentioned. “We sometimes see distant code execution (RCE) flaws dominate Patch Tuesday releases, however solely 1 / 4 of flaws (31) have been RCEs this month.”

Reguly famous that Workplace, browsers, and MOTW have usually appeared in Patch Tuesday updates these days.

“If I have been an infosec purchaser, suppose CISO, I’d be trying on the developments in Microsoft vulnerabilities – recurring and generally exploited applied sciences like Workplace, Edge, CLFS, and MOTW – and I’d be asking my distributors how they’re serving to me proactively defend towards a lot of these vulnerabilities,” he mentioned.

Apple releases massive safety replace

As KrebsonSecurity identified, Apple customers shouldn’t overlook about safety patches.

Apple launched a big safety replace on March 31, addressing some actively exploited vulnerabilities. Usually, Patch Tuesday is an efficient time for organizations to push updates to company-owned gadgets.

Contemplate backing up gadgets earlier than updating in case one thing breaks within the newly put in software program.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments