The March 2025 Security Update Review
March 11, 2025 | Dustin ChildsWe’ve reached the third Patch Tuesday of 2025, and, as expected, Microsoft and Adobe have released their latest security offerings. Take a break from your scheduled activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here:
Adobe Patches for March 2025
For March, Adobe released seven bulletins addressing 37 CVEs in Adobe Acrobat Reader, Substance 3D Sampler, Illustrator, Substance 3D Painter, InDesign, Substance 3D Modeler, and Substance 3D Designer. Six of these bugs were reported through the ZDI program. The patch for Reader contains fixes for multiple Critical-rated code execution bugs. This should be the top priority for deployment. The fix for Illustrator also corrects some Critical-rated code execution bugs. That also holds true for the InDesign patch. For all of the products, an attacker would need to convince a user to open a specially crafted file.
The remaining patches all touch the Substance family of products. The fix for Substance 3D Sampler addressed seven bugs with some of those being Critical. The patch for Substance 3D Painter corrects two code execution bugs. The update for Substance 3D Modeler also has two CVEs, but only one is for a code execution bug. Finally, the patch for Substance 3D Designer addresses two Critical-rated code execution vulnerabilities.
None of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Adobe categorizes these updates as a deployment priority rating of 3.
Microsoft Patches for March 2025
This month, Microsoft released 56 new CVEs in Windows and Windows Components, Office and Office Components, Azure, .NET and Visual Studio, Remote Desktop Services, DNS Server, and Hyper-V Server. One of the actively exploited bugs was submitted through the Trend ZDI program. With the addition of the third-party CVEs, the entire release tops out at 67 CVEs.
Of the patches released today, six are rated Critical, and 50 are rated Important in severity. This is nearly identical to the release last month in volume, but the number of actively exploited bugs is extraordinary.
One of these bugs is listed as publicly known, and six(!) others are listed as under active attack at the time of release. Let’s take a closer look at some of the more interesting updates for this month, starting with the bug discovered by a Trend researcher:
- CVE-2025-26633 - Microsoft Management Console Security Feature Bypass Vulnerability
This bug was discovered by Aliakbar Zahravi and has been seen in the wild and used in targeted attacks. The specific flaw exists within the handling of MSC files. The product does not warn the user before loading an unexpected MSC file. An attacker can leverage this vulnerability to evade file reputation protections and execute code in the context of the current user. There is user interaction required here, but that doesn’t seem to be a problem for the attacker – EncryptHub (aka Larva-208). With more than 600 organizations impacted by these threat actors, test and deploy this fix quickly to ensure your org isn’t added to the list. Ali will have further details about these attacks out soon.
- CVE-2025-24993 - Windows NTFS Remote Code Execution Vulnerability
CVE-2025-24985 - Windows Fast FAT File System Driver Remote Code Execution Vulnerability
These are two more bugs being exploited, and I group them together because they are triggered by the same action. To be exploited, a user would need to mount a specially crafted virtual hard drive (VHD). It’s interesting to see the root cause of these bugs is an overflow; heap-based for the NTFS and an integer overflow for Fast FAT. Once exploited, the attacker can execute code on an affected system. If paired with a privilege escalation (like the one below), they could completely take over a system.
- CVE-2025-24983 - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
This is another bug being actively exploited, but it’s a more traditional privilege escalation than the other one. In this case, an authenticated user would need to run a specially crafted program that ends up executing code with SYSTEM privileges. That’s why these types of bugs are usually paired with a code execution bug to take over a system. Microsoft doesn’t provide any information on how widespread these attacks are, but regardless of how targeted the attacks may be, I would test and deploy these patches quickly.
- CVE-2025-24984/CVE-2025-24991 - Windows NTFS Information Disclosure Vulnerability
These are the final two bugs under active attack in this release. They have different triggers, but both simply lead to info leaks consisting of unspecified memory contents. CVE-2025-24984 requires physical access, which is unusual to see in an active attack. The other CVE requires the target to mount a specially crafted VHD. Even though the info leak isn’t targeted, it must be worth getting since these are being exploited. Don’t sleep on these. Test and deploy the fixes quickly.
Here’s the full list of CVEs released by Microsoft for March 2025:
CVE | Title | Severity | CVSS | Public | Exploited | Type |
CVE-2025-26633 | Microsoft Management Console Security Feature Bypass Vulnerability | Important | 7 | No | Yes | SFB |
CVE-2025-24985 | Windows Fast FAT File System Driver Remote Code Execution Vulnerability | Important | 7.8 | No | Yes | RCE |
CVE-2025-24984 | Windows NTFS Information Disclosure Vulnerability | Important | 4.6 | No | Yes | Info |
CVE-2025-24991 | Windows NTFS Information Disclosure Vulnerability | Important | 5.5 | No | Yes | Info |
CVE-2025-24993 | Windows NTFS Remote Code Execution Vulnerability | Important | 7.8 | No | Yes | RCE |
CVE-2025-24983 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | Important | 7 | No | Yes | EoP |
CVE-2025-26630 | Microsoft Access Remote Code Execution Vulnerability | Important | 7.8 | Yes | No | RCE |
CVE-2025-24057 | Microsoft Office Remote Code Execution Vulnerability | Critical | 7.8 | No | No | RCE |
CVE-2025-26645 | Remote Desktop Client Remote Code Execution Vulnerability | Critical | 8.8 | No | No | RCE |
CVE-2025-24064 | Windows Domain Name Service Remote Code Execution Vulnerability | Critical | 8.1 | No | No | RCE |
CVE-2025-24035 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Critical | 8.1 | No | No | RCE |
CVE-2025-24045 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Critical | 8.1 | No | No | RCE |
CVE-2025-24084 | Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability | Critical | 8.4 | No | No | RCE |
CVE-2025-24070 | ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability | Important | 7 | No | No | EoP |
CVE-2025-21199 | Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability | Important | 6.7 | No | No | EoP |
CVE-2025-26627 † | Azure Arc Installer Elevation of Privilege Vulnerability | Important | 7 | No | No | EoP |
CVE-2025-24049 | Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability | Important | 8.4 | No | No | EoP |
CVE-2025-24986 | Azure Promptflow Remote Code Execution Vulnerability | Important | 6.5 | No | No | RCE |
CVE-2025-24997 | DirectX Graphics Kernel File Denial of Service Vulnerability | Important | 4.4 | No | No | DoS |
CVE-2025-24046 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-24066 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | Important | 8.4 | No | No | EoP |
CVE-2025-24067 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-24995 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-21247 | MapUrlToZone Security Feature Bypass Vulnerability | Important | 4.3 | No | No | SFB |
CVE-2025-24075 | Microsoft Excel Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24081 | Microsoft Excel Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24082 | Microsoft Excel Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24072 | Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-24080 | Microsoft Office Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24083 | Microsoft Office Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-26629 | Microsoft Office Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24076 | Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability | Important | 7.3 | No | No | EoP |
CVE-2025-24994 | Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability | Important | 7.3 | No | No | EoP |
CVE-2025-24071 | Microsoft Windows File Explorer Spoofing Vulnerability | Important | 7.5 | No | No | Spoofing |
CVE-2025-24077 | Microsoft Word Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24078 | Microsoft Word Remote Code Execution Vulnerability | Important | 7 | No | No | RCE |
CVE-2025-24079 | Microsoft Word Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24054 | NTLM Hash Disclosure Spoofing Vulnerability | Important | 6.5 | No | No | Spoofing |
CVE-2025-24996 | NTLM Hash Disclosure Spoofing Vulnerability | Important | 6.5 | No | No | Spoofing |
CVE-2024-9157 * | Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability | Important | N/A | No | No | RCE |
CVE-2025-26631 | Visual Studio Code Elevation of Privilege Vulnerability | Important | 7.3 | No | No | EoP |
CVE-2025-25003 | Visual Studio Elevation of Privilege Vulnerability | Important | 7.3 | No | No | EoP |
CVE-2025-24998 | Visual Studio Installer Elevation of Privilege Vulnerability | Important | 7.3 | No | No | EoP |
CVE-2025-24043 | WinDbg Remote Code Execution Vulnerability | Important | 7.5 | No | No | RCE |
CVE-2025-24059 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-21180 | Windows exFAT File System Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2025-24048 | Windows Hyper-V Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-24050 | Windows Hyper-V Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-24061 | Windows Mark of the Web Security Feature Bypass Vulnerability | Important | 7.8 | No | No | SFB |
CVE-2025-24992 | Windows NTFS Information Disclosure Vulnerability | Important | 5.5 | No | No | Info |
CVE-2025-24051 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2025-25008 | Windows Server Elevation of Privilege Vulnerability | Important | 7.1 | No | No | EoP |
CVE-2025-24056 | Windows Telephony Service Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2025-24987 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability | Important | 6.6 | No | No | EoP |
CVE-2025-24988 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability | Important | 6.6 | No | No | EoP |
CVE-2025-24055 | Windows USB Video Class System Driver Information Disclosure Vulnerability | Important | 4.3 | No | No | Info |
CVE-2025-24044 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2025-1914 * | Chromium: CVE-2025-1914 Out of bounds read in V8 | High | N/A | No | No | N/A |
CVE-2025-1915 * | Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools | Medium | N/A | No | No | N/A |
CVE-2025-1916 * | Chromium: CVE-2025-1916 Use after free in Profiles | Medium | N/A | No | No | N/A |
CVE-2025-1917 * | Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI | Medium | N/A | No | No | N/A |
CVE-2025-1918 * | Chromium: CVE-2025-1918 Out of bounds read in PDFium | Medium | N/A | No | No | N/A |
CVE-2025-1919 * | Chromium: CVE-2025-1919 Out of bounds read in Media | Medium | N/A | No | No | N/A |
CVE-2025-1921 * | Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream | Medium | N/A | No | No | N/A |
CVE-2025-1922 * | Chromium: CVE-2025-1922 Inappropriate Implementation in Selection | Low | N/A | No | No | N/A |
CVE-2025-1923 * | Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts | Low | N/A | No | No | N/A |
CVE-2025-26643 * | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Low | 5.4 | No | No | Spoofing |
* Indicates this CVE had been released by a third party and is now being included in Microsoft releases.
† Indicates further administrative actions are required to fully address the vulnerability.
Moving on to the other Critical-rated bugs, there’s a frightening-looking bug in DNS server that could allow code execution if an attacker sends a specially crafted DNS response to an affected server. However, that is incredibly unlikely to be parsed by the server. Having done DNS spoofing in a past life, it’s tricky, so this is unlikely to be exploited. The Office bug where Preview Pane is an attack vector is more likely to see exploits, but Microsoft confusingly states user interaction is required. Perhaps the target needs to preview the file in the Preview Pane? The bugs in Remote Desktop Services are also concerning as they could allow code execution if an attacker connects to an affected RDS gateway. The Remote Desktop Client bug is less concerning as a target would need to connect to a malicious server. Also less concerning is the bug in the Windows Subsystem for Linux as it requires elevated privileges to exploit.
Looking at the other code execution bugs, there are quite a few open and own bugs in Office components. This includes a bug in Access that’s listed as publicly known. There’s a fix for Azure PromptFlow that allows a remote, unauthenticated attacker to run code on an affected system. The bug in WinDbg could allow code execution due to the improper verification of cryptographic signature in .NET. However, Microsoft fails to provide any details of the exploit scenario. There’s a bug in exFAT that looks similar to two of the bugs being exploited in the wild. Since this one is not listed as exploited, it’s likely a variant of one (or both) of those. Finally, there are bugs in the RRAS and Telephony service, which seems like a monthly standard at this point. We have yet to see any of these types of bugs exploited, so there is not much concern there.
There are a handful of privilege escalation bugs receiving fixes in this month’s release, and most of these either lead to SYSTEM-level code execution or administrative privileges if an authenticated user runs specially crafted code. Beyond those, the bugs in Hyper-V could lead to Kernel Memory Access. The bug in Windows Server could lead to a file deletion, which can then be turned into a privilege escalation. A similar bug was reported as being under active attack last month. One of the Visual Studio bugs leads to escalating to privileges of the affected application. That’s also true for the bug in Azure Command Line Integration (CLI). The bug in ASP.NET Core and Visual Studio allows an attacker to escalate to the privileges of the compromised user. The bug in Azure Arc Installer leads to SYSTEM privileges, but you’ll need to do more than just patch to address it. This only affects machines onboarded via Group Policy, but if they were, you’ll need to roll out new GPOs to fully resolve the vulnerability.
In addition to the security feature bypass (SFB) bug being exploited in the wild, there are two other SFB fixes in this month’s release. The first is in MapUrlToZone. This bug allows attackers to bypass the security feature and have URLs processed in incorrect zones. The other is in Mark of the Web, which we have seen abused by threat actors in the past. Again, the vulnerability allows files to be treated as though they aren’t as dangerous as they seem and fails to warn users – who generally click on anything.
Looking at the Spoofing bugs in the March release, two are listed as NTLM Hash Disclosures. In both cases, user interaction is required. However, that interaction can be as simple as a single clicking (selecting) on a malicious file. If successful, an attacker could then spoof that NTLM hash for further compromise. There are not many details available for the File Explorer spoofing bug other than to say that a remote, unauthenticated attacker could “perform spoofing over a network.”
There are only two other information disclosure bugs this month, and one looks like a variant of the NTFS info disclosures under active attack. Again, it only yields unspecified memory contents. That’s also true for the bug in the Windows USB Video Driver, but Microsoft notes this is a physical attack. They don’t specify what type of physical attack, but considering it’s in a USB component, that likely means plugging in a USB device.
The March release contains just one Denial-of-Service (DoS) bug in the DirectX Graphics Kernel File, but it requires admin credentials to exploit.
No new advisories are being released this month.
Looking Ahead
The next Patch Tuesday of 2025 will be on April 11, and I’ll return with my analysis and thoughts about the release. Until then, stay safe, happy patching, and may all your reboots be smooth and clean!