The Register: Choose your own Patch Tuesday adventure: Start with six zero day fixes, or six critical flaws

Source URL: https://www.theregister.com/2025/03/12/patch_tuesday/
Source: The Register
Title: Choose your own Patch Tuesday adventure: Start with six zero day fixes, or six critical flaws

Feedly Summary: Microsoft tackles 50-plus security blunders, Adobe splats 3D bugs, and Apple deals with a doozy
Patch Tuesday Microsoft’s Patch Tuesday bundle has appeared, with a dirty dozen flaws competing for your urgent attention – six of them rated critical and another six already being exploited by criminals.…

AI Summary and Description: Yes

Summary: The text discusses Microsoft’s Patch Tuesday for March, detailing a dozen security vulnerabilities, including several critical flaws that are already being exploited. It highlights specific CVEs affecting Windows NTFS, Remote Desktop Services, and other systems, presenting risks of remote code execution and privilege escalation.

Detailed Description: This analysis provides an overview of significant security issues addressed in Microsoft’s March Patch Tuesday release. Key points include:

– **Total Vulnerabilities**: Microsoft has released patches for 57 vulnerabilities, with a focus on a critical subset that is already being exploited in the wild.
– **Exploited Vulnerabilities**: Among the flaws noted, six are actively being targeted. The three major ones impacting Windows NTFS include:
– **CVE-2025-24993**: A heap-based buffer overflow allowing remote code execution (RCE), requiring local action such as mounting a malicious VHD.
– **CVE-2025-24991**: An information-disclosure flaw permitting out-of-bounds reads, also reliant on user interaction.
– **CVE-2025-24984**: Enabling sensitive information to be inserted into logs, necessitating physical access.
– **Additional Active Exploits**:
– **CVE-2025-24985**: A code execution bug in the Windows Fast FAT File System requiring a local user interaction.
– **CVE-2025-24983**: A privilege escalation vulnerability within the Win32 Kernel that can elevate access to SYSTEM level.
– **CVE-2025-26633**: A security feature bypass exploited through specially crafted MSC files, affecting Microsoft Management Console.

– **Critical Flaws**:
– Highlighted are two critical vulnerabilities in Windows Remote Desktop Services with an 8.1 CVSS rating.
– Critical flaws in Office software and Windows Subsystem for Linux were also noted, which could potentially lead to significant security breaches.

– **Other Vendors**: The text also mentions updates from Apple and Adobe:
– **Apple**: Addressed a serious Web Content sandbox bypass in Safari, indicating advanced threats targeted specific individuals.
– **Adobe**: Fixed multiple vulnerabilities across its software offerings, including critical flaws that allow arbitrary code execution.

– **Android Updates**: Google has issued patches for Android, specifically for two flaws under limited exploitation that are critical and associated with remote code execution risks.

Overall, the discussed vulnerabilities underscore the need for immediate action from users and organizations to update systems and mitigate risks. This highlights a continuous cycle of evolving threats in the cybersecurity landscape, emphasizing the importance of proactive vulnerability management in maintaining security resilience.

– Security Professionals should:
– Prioritize patching known vulnerabilities as soon as patches are available.
– Implement training for users to recognize and avoid social engineering tactics that could lead to exploitation.
– Monitor for threats associated with the discussed CVEs, especially in environments utilizing affected Microsoft, Apple, or Adobe products.