Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft Patches 57 Deficieks of Security, including 6 active zero days
Global Security

Microsoft Patches 57 Deficieks of Security, including 6 active zero days

AdminBy AdminMarch 12, 2025No Comments4 Mins Read
Microsoft
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 12, 2025Red LakshmananPatch on Tuesday / vulnerability

Microsoft

Microsoft on Tuesday liberated Security updates to solve 57 safety vulnerabilities in its software, including a tremendous six zero days, which, he said, are actively exploited in the wild.

Of the 56 deficiencies, six are estimated critical, 50 are important and one is low in severity. Twenty-three of the addressed vulnerabilities are the remote code errors and 22 refer to the escalation of privileges.

Updates in addition to 17 vulnerability Microsoft addressed to its browser based on Chromium since the exit Update Patch last month on Tuesdayone of which is a disadvantage of a fake characteristic of the browser (Cve-2025-26643CVS’s assessment: 5.4).

Six vulnerabilities that came under active operation are below –

  • Cve-2025-24983 (CVSS assessment: 7.0) —The difference of Windows Win32 subsystem subsystems
  • Cve-2025-24984 (CVSS Assessment: 4.6) – Windows NTFs Information, which allows an attacker with physical access to the target device and capable of connecting a harmful USB to potentially read parts of a pile of memory
  • Cve-2025-24985 (CVSS assessment: 7.8) – Vulnerability of a whole overflow in the FAST FAT Window driver
  • Cve-2025-2491 .
  • Cve-2025-2493 (CVSS assessment: 7.8) – vulnerability of overflow buffer based on the pile in Windows NTFs, which allows an unauthorized attacker to perform a code locally
  • Cve-2025-26633 .

ESET, which is credited with the detection and reporting of the CVE-2025-24983, stated that for the first time revealed a feat with zero day in the wild in March 2023 and put through the back called Pipemagic on the compromised hosts.

Cybersecurity

“Vulnerability- it is without using the Win32K driver” Slovakian company noted. “In a certain scenario achieved using the API WaitforinPutidle, the W32Process structure gets derefed more time than you need, resulting in the UAF. To achieve vulnerability, you need to win the race.”

Pipemagic, first discovered in 2022, is a trojan based on a plugin that aimed at organizing in Asia and Saudi Arabia, and malicious software is common in the form of a false Chatgpt app at the end of 2024.

“One of the unique features of the Pipemagic is that it creates a 16-bite random array to create a specified pipe in the \\. \ Pipe \ 1.“Caspersorsky disclosed In October 2024. “It gives rise to a thread that constantly creates this pipe, reads from it, and then destroys it.”

“This pipe is used for receiving custom useful loads, a stop lighting using a local default interface. Pipemagic usually works with several plagues loaded with command and control server (C2), which in this case was located on Microsoft Azure.”

The zero day initiative states that the CVE-2025-26633 stems from how MSc files are processed, allowing the attacker to avoid protecting files and execute the code in the current user’s context. Activities has been linked to a tracked actor threats Encryption (AKA LICERVA-208).

Action1 – noted This threat of actors can attach four vulnerabilities that affect the main components of the Windows file to cause the removed code (CVE-2025-24985 and CVE-2025-24993) and disclosure (CVE-2024984 and CVE-2025-2491). All four errors were reported anonymously.

“In particular, the operation relies on the attacker who creates a malicious VHD file and convinced the user to open or install VHD file,” said Kev Brin, Senior Director for threats in the threats. “VHD is a virtual hard drive and usually associated with the storage of the operating system for virtual machines.”

“While they are more often related to virtual machines, we have seen examples over the years when the threat subjects use VHD or VHDX files as part of phishing campaigns to reshape the malicious software passes past AV solutions. Depending on the Windows configuration, just twice incorporating the VHD to install the VHD to install the VHD. overload contained in the divided file. “

According to Satnam Narang, a senior engineer in research officers in Tenable, Cve-2025-2633-Drugs in the MMC used in the wild as a zero day after Cve-2024-43572 and Cve-2025-24985

Cybersecurity

As it is customary, it is not known now that the rest of the vulnerabilities are used in which context and accurately scale the attacks. Development has proposed Agency for cybersecurity and US infrastructure (CISA) to add them to well -known exploited vulnerabilities (Ship) A catalog that requires federal agencies to apply by April 1, 2025.

Software patches from other suppliers

In addition to Microsoft, over the past few weeks have also been released security updates to fix multiple vulnerabilities, including –

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.