Microsoft’s March Patch Tuesday: 53 Fixes, Including 5 Weaponized Threats
The release consists of:
- 6 Critical and 47 Important fixes.
- Coverage across Windows, Windows Components, MMC, Microsoft Office, Remote Desktop Services, Hyper-V & Visual Studio.
- A combined CVSS score of 386.3, with an average severity of 7.3 –slightly lower than last month’s.
Robert Brown, Senior Director of Professional Services at Absolute, emphasizes the importance of prioritization in vulnerability management.
Patch Tuesday Recap: Top 5 Vulnerabilities You Need to Know
As always, Patch Tuesday brings critical updates and security fixes to keep your systems protected. Here’s a breakdown of the most significant issues and why you should prioritise addressing them immediately.
- CVE-2025-24985 – Windows Fast FAT File System Driver Remote Code Execution
🚨 Weaponized, actively exploited
Attackers can execute arbitrary code on a targeted system by exploiting a flaw in the Windows Fast FAT File System Driver, potentially leading to full system compromise.
🔹 Severity: Important | CVSS Score: 7.8
🔹 Attack Vector: Local | Privileges Required: None
🔹 User Interaction: Required | Complexity: Low
This vulnerability allows attackers to run malicious code on a system, potentially installing malware or gaining deeper system access. Since user interaction is required, phishing campaigns may be the primary attack vector. Microsoft has confirmed this vulnerability affects multiple versions of Windows, including Windows 10 and 11. No known workarounds are available, and immediate patching is recommended.
- CVE-2025-24993 – Windows NTFS Remote Code Execution
🚨 Weaponized, actively exploited
A critical flaw in NTFS allows attackers to craft malicious files that, when opened, trigger remote code execution.
🔹 Severity: Important | CVSS Score: 7.8
🔹 Attack Vector: Local | Privileges Required: None
🔹 User Interaction: Required | Complexity: Low
This vulnerability can be exploited via social engineering, tricking users into opening files that lead to full system compromise. It poses a significant risk in environments where file-sharing is common. Attackers can craft NTFS metadata to execute malicious code with system-level privileges. The exploit is actively being used in the wild, emphasizing the need for urgent patching.
- CVE-2025-24983 – Windows Win32 Kernel Subsystem Elevation of Privilege
🚨 Weaponized, actively exploited
Attackers can escalate privileges from a standard user to an administrator, potentially taking full control of an affected system.
🔹 Severity: Important | CVSS Score: 7.0
🔹 Attack Vector: Local | Privileges Required: Low
🔹 User Interaction: None | Complexity:High
Privilege escalation vulnerabilities are often used in tandem with other exploits to gain deeper access within a compromised system. Attackers leveraging this flaw can disable security tools and maintain persistence. The flaw stems from improper permission handling in the Win32 Kernel Subsystem, allowing low-privileged users to manipulate system resources. There are no mitigations, and patching is the only effective remediation.
- CVE-2025-26633 – Microsoft Management Console Security Feature Bypass
🚨 Weaponized, actively exploited
A security bypass in Microsoft Management Console (MMC) allows attackers to evade security policies, leading to unauthorized system modifications.
🔹 Severity: Important | CVSS Score: 7.0
🔹 Attack Vector: Local | Privileges Required: None
🔹 User Interaction: Required | Complexity: High
While this vulnerability does not provide direct control, it can be exploited to weaken system security, making future attacks more effective. Admins should patch systems to prevent abuse. Exploiting this vulnerability requires user interaction with maliciously crafted MMC files. Microsoft has advised against opening MMC files from untrusted sources.
- CVE-2025-24991 – Windows NTFS Information Disclosure
🚨 Weaponized, actively exploited
A flaw in NTFS allows attackers to access restricted data without proper authorization.
🔹 Severity: Important | CVSS Score: 5.5
🔹 Attack Vector: Local | Privileges Required: None
🔹 User Interaction: Required | Complexity: Low
Although this vulnerability does not directly lead to system compromise, attackers can use the exposed information for reconnaissance, aiding future privilege escalation or credential theft attacks. This flaw could allow attackers to extract sensitive system data that could assist in other exploits. Microsoft has not provided any workarounds, making patching critical.
Final Thoughts: Act Now to Stay Secure
March’s Patch Tuesday highlights the ongoing risks of unpatched vulnerabilities, especially as attackers leverage AI and automation to identify new exploits faster than ever before.
- Prioritize patches for actively exploited and publicly disclosed vulnerabilities.
- Ensure your security team is equipped to respond quickly.
- Consider leveraging automation and vulnerability management solutions to stay ahead of threats.
Need help implementing these patches or optimizing your cybersecurity strategy? Our team is here to assist, reach out today.
Until next time, Happy Patching
| Reference | Description | Additional Information | Vendor Severity |
CVSS Severity
|
Publicly Aware
|
Weaponised | Countermeasure | Impact |
Exploitability Assessment
|
| CVE-2025-24985 |
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
|
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
|
Important | 7.8 | No | Yes | No | Remote Code Execution | Exploitation Detected |
| CVE-2025-24993 | Windows NTFS Remote Code Execution Vulnerability |
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
|
Important | 7.8 | No | Yes | No | Remote Code Execution | Exploitation Detected |
| CVE-2025-24983 |
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.0 | No | Yes | No | Elevation of Privilege | Exploitation Detected |
| CVE-2025-26633 |
Microsoft Management Console Security Feature Bypass Vulnerability
|
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
|
Important | 7.0 | No | Yes | No | Security Feature Bypass | Exploitation Detected |
| CVE-2025-24991 | Windows NTFS Information Disclosure Vulnerability |
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. |
Important | 5.5 | No | Yes | No | Information Disclosure | Exploitation Detected |
| CVE-2025-24984 | Windows NTFS Information Disclosure Vulnerability |
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. |
Important | 4.6 | No | Yes | No | Information Disclosure | Exploitation Detected |
| CVE-2025-26630 | Microsoft Access Remote Code Execution Vulnerability |
Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.
No, the Preview Pane is not an attack vector. |
Important | 7.8 | Yes | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-26645 | Remote Desktop Client Remote Code Execution Vulnerability |
Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
|
Critical | 8.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24051 |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
|
Important | 8.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24056 |
Windows Telephony Service Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.
|
Important | 8.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24084 |
Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
|
Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.
|
Critical | 8.4 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24066 |
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 8.4 | No | No | No | Elevation of Privilege | Exploitation More Likely |
| CVE-2025-24035 |
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
|
Critical | 8.1 | No | No | No | Remote Code Execution | Exploitation More Likely |
| CVE-2025-24045 |
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
|
Critical | 8.1 | No | No | No | Remote Code Execution | Exploitation More Likely |
| CVE-2025-24064 |
Windows Domain Name Service Remote Code Execution Vulnerability
|
Use after free in DNS Server allows an unauthorized attacker to execute code over a network.
|
Critical | 8.1 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24057 | Microsoft Office Remote Code Execution Vulnerability |
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
|
Critical | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-21180 |
Windows exFAT File System Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.
|
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation More Likely |
| CVE-2025-24044 |
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation More Likely |
| CVE-2025-24046 |
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24048 | Windows Hyper-V Elevation of Privilege Vulnerability |
Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24050 | Windows Hyper-V Elevation of Privilege Vulnerability |
Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24059 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
|
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24061 |
Windows Mark of the Web Security Feature Bypass Vulnerability
|
Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.
An attacker who successfully exploited the vulnerability could evade Mark of the Web (MOTW) defenses. |
Important | 7.8 | No | No | No | Security Feature Bypass | Exploitation More Likely |
| CVE-2025-24067 |
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
|
Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation More Likely |
| CVE-2025-24072 |
Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
|
Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24075 | Microsoft Excel Remote Code Execution Vulnerability |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
The Preview Pane is not an attack vector |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24077 | Microsoft Word Remote Code Execution Vulnerability |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
The Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24079 | Microsoft Word Remote Code Execution Vulnerability |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
The Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24080 | Microsoft Office Remote Code Execution Vulnerability |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
The Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24081 | Microsoft Excel Remote Code Execution Vulnerability |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
No, the Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24082 | Microsoft Excel Remote Code Execution Vulnerability |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
No, the Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24083 | Microsoft Office Remote Code Execution Vulnerability |
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
No, the Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24995 |
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
|
Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.8 | No | No | No | Elevation of Privilege | Exploitation More Likely |
| CVE-2025-26629 | Microsoft Office Remote Code Execution Vulnerability |
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
No, the Preview Pane is not an attack vector. |
Important | 7.8 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24043 | WinDbg Remote Code Execution Vulnerability |
Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.
|
Important | 7.5 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24071 | Microsoft Windows File Explorer Spoofing Vulnerability |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
|
Important | 7.5 | No | No | No | Spoofing | Exploitation Less Likely |
| CVE-2025-24076 |
Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
|
Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.3 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24994 |
Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
|
Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.
|
Important | 7.3 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24998 | Visual Studio Installer Elevation of Privilege Vulnerability |
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain administrator privileges. |
Important | 7.3 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-25003 | Visual Studio Elevation of Privilege Vulnerability |
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
|
Important | 7.3 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-26631 | Visual Studio Code Elevation of Privilege Vulnerability |
Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 7.3 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-25008 | Windows Server Elevation of Privilege Vulnerability |
Improper link resolution before file access (‘link following’) in Microsoft Windows allows an authorized attacker to elevate privileges locally.
An attacker would be able to delete targeted files on a system. |
Important | 7.1 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24070 |
ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
|
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.
An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user. |
Important | 7.0 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24078 | Microsoft Word Remote Code Execution Vulnerability |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
The Preview Pane is not an attack vector. |
Important | 7.0 | No | No | No | Remote Code Execution | Exploitation Less Likely |
| CVE-2025-24987 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
|
Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 6.6 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24988 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
|
Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. |
Important | 6.6 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24054 | NTLM Hash Disclosure Spoofing Vulnerability |
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
|
Important | 6.5 | No | No | No | Spoofing | Exploitation Less Likely |
| CVE-2025-24996 | NTLM Hash Disclosure Spoofing Vulnerability |
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
|
Important | 6.5 | No | No | No | Spoofing | Exploitation Less Likely |
| CVE-2025-21199 |
Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
|
Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.
|
Important | 5.8 | No | No | No | Elevation of Privilege | Exploitation Less Likely |
| CVE-2025-24992 | Windows NTFS Information Disclosure Vulnerability |
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. |
Important | 5.5 | No | No | No | Information Disclosure | Exploitation More Likely |
| CVE-2025-24997 | DirectX Graphics Kernel File Denial of Service Vulnerability |
Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.
|
Important | 4.4 | No | No | No | Denial of Service | Exploitation Less Likely |
| CVE-2025-21247 | MapUrlToZone Security Feature Bypass Vulnerability |
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
|
Important | 4.3 | No | No | No | Security Feature Bypass | Exploitation More Likely |
| CVE-2025-24055 |
Windows USB Video Class System Driver Information Disclosure Vulnerability
|
Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.
|
Important | 4.3 | No | No | No | Information Disclosure |