Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

Trump’s Oil’s preferred price is $40-50 based on his social media post

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Microsoft Patch 57 Security flaws including six actively misused zero-days
Identity

Microsoft Patch 57 Security flaws including six actively misused zero-days

userBy userMarch 12, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 12, 2025Ravi LakshmananTuesday / Vulnerability Patch

Microsoft

Microsoft released a security update on Tuesday to address 57 security vulnerabilities in the software. This includes six zero-days that are said to be actively misused in the wild.

Of the 56 defects, six are rated as important, 50 are rated as important, and one is rated as low severity. The 23 vulnerabilities addressed are remote code execution bugs, while 22 is related to privilege escalation.

The update will be added in addition to 17 vulnerabilities that Microsoft has addressed in chrome-based Edge browsers since the release of the update on patch Tuesday last month.

Below are six vulnerabilities under aggressive exploitation –

CVE-2025-24983 (CVSS score: 7.0) – Windows Win32 Kernel Subsystem Youth After-Free (UAF) vulnerability. Potentially read malicious USB drives that read part of CVE-2025-24984 (CVSS score: 4.6) heap memory CVE-2025-24985 (CVSS score: 7.8) where certified attackers can increase local privileges – Integer overflow vulnerability in Windows Fast Fat File System Driver. CVE-2025-24993 (CVSS score: 7.8) – Windows NTFS heap-based buffer overflow vulnerability security feature that allows fraudulent attackers to execute code locally

ESET, which has been recognized for discovery and reporting of CVE-2025-24983, said it first discovered a zero-day exploit on Wild in March 2023 and was delivered to compromised hosts via a backdoor named Pipemagic.

Cybersecurity

“The Win32K driver vulnerability is invalid,” Slovakian Company said. “In certain scenarios achieved using the WaitforInputidle API, the W32Process structure must win racial conditions in order to cause UAF and reach vulnerability.”

First discovered in 2022, Pipemagic is a plugin-based Trojan targeting Asian and Saudi Arabian entities, with the malware being distributed in the form of fake Openai ChatGPT applications in a campaign in late 2024.

“One of Pipemagic’s unique features is to generate a random array of 16 bytes and create named pipes in the format\\.\Pipe\1.,” Kaspersky revealed in October 2024. ”

“This pipe is used to receive encoded payloads and stops signals through the default local interface. Piping usually works with multiple plugins downloaded from a command and control (C2) server. In this case, it is hosted in Microsoft Azure.”

The Zero Day initiative noted that CVE-2025-26633 was due to the way MSC files were handled, and that attackers could circumvent file reputation protection and execute code in the context of the current user. This activity is linked to a threat actor tracked as encrypthub (aka Larva-208).

Action1 noted that four vulnerabilities that threat actors affect core window file system components can cause remote code execution (CVE-2025-24985 and CVE-2025-24993) and disclosure (CVE-2025-24984 and CVE-2025-24991). All four bugs were reported anonymously.

“Specifically, exploits rely on attackers to create malicious VHD files and convince users to open or mount the VHD file,” says Kev Breen, senior director of threat research at Immersive. “VHDs are virtual hard disks and are usually associated with storing the operating system for virtual machines.”

“They are commonly associated with virtual machines, but we’ve seen many years of examples of threat actors using VHD or VHDX files as part of phishing campaigns in the past that smuggled malware payloads.

According to Satnam Narang, Senior Staff Research Engineer at Tenable, CVE-2025-26633 became the second flaw in the wild as zero-day MMC after CVE-2024-43572 and CVE-2025-24985, the first vulnerability in Windows Fast File System Driver since March 2022.

Cybersecurity

As is conventional, it is unknown what the remaining vulnerabilities are currently being exploited in what context and at the exact scale of the attack. This development prompted the US Cybersecurity and Infrastructure Security Agency (CISA) to add them to a known exploited vulnerabilities (KEV) catalogue that requires federal agencies to apply fixes by April 1, 2025.

Software patches from other vendors

In addition to Microsoft, security updates have also been released by other vendors over the past few weeks, rectifying some vulnerabilities.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhat kind of light is needed for quantum technology?
Next Article North Korean government hacker sneaks spyware on Android App Store
user
  • Website

Related Posts

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

May 14, 2025

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

May 14, 2025

Xinbi Telegram Market is $840 million in crypto crime, romance fraud, North Korean laundry

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

Trump’s Oil’s preferred price is $40-50 based on his social media post

Xinbi Telegram Market is $840 million in crypto crime, romance fraud, North Korean laundry

Trending Posts

As combat resumes in Tripoli, Libya, we are seeking calmness | Conflict News

May 14, 2025

Did the US flutter first in the tariff war with China? |Trade War News

May 14, 2025

Novelist Viet Thanh nguyen weighs the costs against fraud | Arts and Culture News

May 14, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AI infrastructure startup TensorWave raises $100 million to meet the rising demand for AI calculations

DataBricks acquires serverless database startup neon for $1 billion to boost AI agent development

All the steps you can take to make your online bet safer

Etoro is revealed at a $52 IPO and is worth $4.2 billion amid the retail and crypto boom

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.