{"id":37310,"date":"2025-03-12T00:01:51","date_gmt":"2025-03-11T23:01:51","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=37310"},"modified":"2025-03-13T06:35:41","modified_gmt":"2025-03-13T05:35:41","slug":"microsoft-security-update-summary-march-11-2025","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/03\/12\/microsoft-security-update-summary-march-11-2025\/","title":{"rendered":"Microsoft Security Update Summary (March 11, 2025)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Update-01.jpg\" alt=\"Update\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/03\/12\/microsoft-security-update-summary-11-maerz-2025\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft released security updates for Windows clients and servers, Office and other products on March 11, 2025. The security updates eliminate 56 vulnerabilities (CVEs), seven of which were classified as 0-day. Six vulnerabilities are already under attack. Below is a compact overview of the updates that were released on Patchday.<\/p>\n<p><!--more--><\/p>\n<h2>Notes on the updates<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/c78bd2cb9af84d1bbb162b315006b4a3\" alt=\"\" width=\"1\" height=\"1\" \/>A list of the updates can be found on <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\" target=\"_blank\" rel=\"noopener\">this Microsoft page<\/a>. Details on the update packages for Windows, Office etc. are available in separate blog posts.<\/p>\n<h3>Windows 10\/11, Windows Server<\/h3>\n<p>All Windows 10\/11 updates (as well as the updates of the server counterparts) are cumulative. The monthly patchday update contains all security fixes for these Windows versions &#8211; as well as all non-security fixes up to the patchday. In addition to the security patches for the vulnerabilities, the updates also contain fixes to correct errors or new features.<\/p>\n<h3>Windows Server 2012 R2<\/h3>\n<p>An ESU license is required for Windows Server 2012 \/R2 to receive further security updates (<a href=\"https:\/\/borncity.com\/win\/2023\/11\/11\/windows-server-2012-r2-gets-extended-security-updates-esu-until-october-2026\/\">Windows Server 2012\/R2 gets Extended Security Updates (ESU) until October 2026<\/a>).<\/p>\n<h2>Fixed vulnerabilities<\/h2>\n<p>Tenable has published <a href=\"https:\/\/www.tenable.com\/blog\/microsofts-march-2025-patch-tuesday-addresses-56-cves-cve-2025-26633-cve-2025-24983\" target=\"_blank\" rel=\"noopener\">this blog post<\/a> with an overview of the vulnerabilities that have been fixed. Here are some of the critical vulnerabilities that have been fixed:<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-26633\" target=\"_blank\" rel=\"noopener\">CVE-2025-26633<\/a>: Microsoft Management Console Security Feature Bypass Vulnerability, CVEv3 Score 7.0, important; An attacker could exploit this vulnerability by tricking a potential target with standard user or administrator privileges into opening a malicious file. According to Microsoft, CVE-2025-26633 has been exploited as a zero-day in the wild.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24985\" target=\"_blank\" rel=\"noopener\">CVE-2025-24985<\/a>: Windows Fast FAT File System Driver Remote Code Execution vulnerability, CVEv3 Score 7.8, important; A local attacker could exploit this vulnerability by tricking a potential target into mounting a specially crafted virtual hard disk (VHD). Successful exploitation would allow the attacker to execute arbitrary code. According to Microsoft, CVE-2025-24985 has been exploited in the wild as a zero-day.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24044\" target=\"_blank\" rel=\"noopener\">CVE-2025-24044<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24983\" target=\"_blank\" rel=\"noopener\">CVE-2025-24983<\/a>: Windows Win32 Kernel Subsystem Elevation of Privilege vulnerabilities, CVEv3 score 7.0 &#8211; 7.8, important; A local, authenticated attacker would need to win a race condition to exploit CVE-2025-24983. Successful exploitation of either vulnerability would allow the attacker to gain SYSTEM privileges. According to Microsoft, CVE-2025-24983 has been exploited in the wild as a zero-day. While CVE-2025-24044 was not exploited, Microsoft classified this vulnerability as \"Exploitation More Likely\" according to Microsoft's Exploitability Index.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24993\" target=\"_blank\" rel=\"noopener\">CVE-2025-24993<\/a>: Windows NTFS Remote Code Execution vulnerability, CVEv3 Score 7.8, important; According to Microsoft, a heap-based buffer overflow can be exploited to execute arbitrary code on an affected system. To exploit this vulnerability, an attacker must trick a local user into mounting a manipulated VHD. According to Microsoft, this vulnerability has already been exploited as a zero-day.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24984\" target=\"_blank\" rel=\"noopener\">CVE-2025-24984<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24991\" target=\"_blank\" rel=\"noopener\">CVE-2025-24991<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24992\" target=\"_blank\" rel=\"noopener\">CVE-2025-24992<\/a>: Windows NTFS Information Disclosure vulnerability, CVEv3 Score 4.6 &#8211; 5.5, important; All three vulnerabilities can be exploited through physical attacks, for example, by an attacker using a malicious USB drive or tricking a local user into mounting a tampered VHD.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-26630\" target=\"_blank\" rel=\"noopener\">CVE-2025-26630<\/a>: Microsoft Access Remote Code Execution vulnerability, CVEv3 Score 7.8, important; An attacker could exploit this vulnerability by using social engineering to trick a potential target into downloading a malicious file and executing it on their system. Successful exploitation would allow the attacker to execute arbitrary code. CVE-2025-26630 is considered a zero-day vulnerability as it was publicly disclosed before a patch was available.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24035\" target=\"_blank\" rel=\"noopener\">CVE-2025-24035<\/a>, <span style=\"text-decoration: underline;\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-24045\" target=\"_blank\" rel=\"noopener\">CVE-2025-24045<\/a><\/span>: Windows Remote Desktop Services Remote Code Execution important, CVEv3 Score 7.0-7.8, important; To exploit these vulnerabilities, an attacker must be able to gain a race condition. Despite this requirement, Microsoft classified both vulnerabilities as \"Exploitation More Likely\".<\/li>\n<\/ul>\n<p>A list of all discovered CVEs can be found on <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/\" target=\"_blank\" rel=\"noopener\">this Microsoft site<\/a>, excerpts are available at Tenable.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2025\/03\/12\/microsoft-security-update-summary-march-11-2025\/\">Microsoft Security Update Summary (March 11, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/12\/patchday-windows-10-11-updates-march-11-2025\/\">Patchday: Windows 10\/11 Updates (March 11, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/12\/patchday-windows-server-updates-march-11-2025\/\">Patchday: Windows Server-Updates (March 11, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/13\/patchday-microsoft-office-updates-march-11-2025\/\">Patchday: Microsoft Office Updates (March 11, 2025)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft released security updates for Windows clients and servers, Office and other products on March 11, 2025. The security updates eliminate 56 vulnerabilities (CVEs), seven of which were classified as 0-day. Six vulnerabilities are already under attack. Below is a &hellip; <a href=\"https:\/\/borncity.com\/win\/2025\/03\/12\/microsoft-security-update-summary-march-11-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580,1547,22,2],"tags":[125,2899,69,1544,195,194],"class_list":["post-37310","post","type-post","status-publish","format-standard","hentry","category-office","category-security","category-software","category-update","category-windows","tag-office","tag-patchday-3-2025","tag-security","tag-software","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=37310"}],"version-history":[{"count":7,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37310\/revisions"}],"predecessor-version":[{"id":37334,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37310\/revisions\/37334"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=37310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=37310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=37310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}