icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Microsoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws

Summary:
As part of the February Microsoft Patch Tuesday, Microsoft addressed 55 flaws, including 4 zero-day flaws, two of which are actively being exploited in attacks in the wild. Of the 55 flaws, there was 19 elevation of privilege vulnerabilities, 2 security feature bypass vulnerabilities, 22 remote code execution vulnerabilities, 1 information disclosure vulnerability, 9 denial of service vulnerabilities, and 3 spoofing vulnerabilities. 3 flaws have been rated critical in severity, all of which can lead to remote code execution.

In addition to Microsoft, several other vendors have released updates in February 2024:
Security Officer Comments:
The actively exploited zero-day flaws are being tracked as CVE-2025-21391 and CVE-2025-21418. CVE-2025-21391 pertains to a Windows Storage Elevation of Privilege vulnerability that could enable an actor to remotely delete targeted files on a system. Microsoft notes that the “vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.”

CVE-2025-2191 on the other hand pertains to a Windows Ancillary Function Driver for WinSock Elevation of Privilege vulnerability. The flaw can be exploited in low-complexity attacks and can be successfully exploited by actors to gain system privileges on targeted devices.

Although Microsoft has confirmed that CVE-2025-21391 and CVE-2025-21418 are being actively exploited in the wild, specific details about these ongoing intrusions have not yet been disclosed.

Suggested Corrections:
Organizations should review the list of vulnerabilities resolved and apply the relevant patches as needed. To access the full list of vulnerabilities addressed, please use the link down below:

https://www.bleepingcomputer.com/mi...ts/Microsoft-Patch-Tuesday-February-2025.html

Link(s):
https://www.bleepingcomputer.com/ne...025-patch-tuesday-fixes-4-zero-days-55-flaws/