{"id":25807,"date":"2025-03-02T09:48:09","date_gmt":"2025-03-02T17:48:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/03\/02\/news-19528\/"},"modified":"2025-03-02T09:48:09","modified_gmt":"2025-03-02T17:48:09","slug":"news-19528","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/03\/02\/news-19528\/","title":{"rendered":"Microsoft Patch Tuesday, February 2025 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 12 Feb 2025 04:58:37 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"749\" height=\"527\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>All supported Windows operating systems will receive an update this month for a buffer overflow vulnerability that carries the catchy name <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21418\" target=\"_blank\" rel=\"noopener\">CVE-2025-21418<\/a>. This patch should be a priority for enterprises, as Microsoft says it is being exploited, has low attack complexity, and no requirements for user interaction.<\/p>\n<p><strong>Tenable<\/strong> senior staff research engineer <strong>Satnam Narang<\/strong> noted that since 2022, there have been nine elevation of privilege vulnerabilities in this same Windows component &#8212; three each year &#8212; including one in 2024 that was exploited in the wild as a zero day (CVE-2024-38193).<\/p>\n<p>&#8220;CVE-2024-38193 was exploited by the North Korean APT group known as Lazarus Group to implant a new version of the FudModule rootkit in order to maintain persistence and stealth on compromised systems,&#8221; Narang said. &#8220;At this time, it is unclear if CVE-2025-21418 was also exploited by Lazarus Group.&#8221;<\/p>\n<p>The other zero-day, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21391\" target=\"_blank\" rel=\"noopener\">CVE-2025-21391<\/a>, is an elevation of privilege vulnerability in Windows Storage that could be used to delete files on a targeted system. Microsoft&#8217;s advisory on this bug references something called \u201cCWE-59: Improper Link Resolution Before File Access,&#8221; says no user interaction is required, and that the attack complexity is low.<\/p>\n<p><strong>Adam Barnett<\/strong>, lead software engineer at <strong>Rapid7<\/strong>, said although the advisory provides scant detail, and even offers some vague reassurance that &#8216;an attacker would only be able to delete targeted files on a system,&#8217; it would be a mistake to assume that the impact of deleting arbitrary files would be limited to data loss or denial of service.<\/p>\n<p>&#8220;As long ago as 2022, ZDI researchers set out how a motivated attacker could parlay arbitrary file deletion into full SYSTEM access using techniques which also involve creative misuse of symbolic links,&#8221;Barnett wrote.<span id=\"more-70396\"><\/span><\/p>\n<p>One vulnerability patched today that was publicly disclosed earlier is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21377\" target=\"_blank\" rel=\"noopener\">CVE-2025-21377<\/a>, another weakness that could allow an attacker to elevate their privileges on a vulnerable Windows system. Specifically, this is yet another Windows flaw that can be used to steal NTLMv2 hashes &#8212; essentially allowing an attacker to authenticate as the targeted user without having to log in.<\/p>\n<p>According to Microsoft, minimal user interaction with a malicious file is needed to exploit CVE-2025-21377, including selecting, inspecting or &#8220;performing an action other than opening or executing the file.&#8221;<\/p>\n<p>&#8220;This trademark linguistic ducking and weaving may be Microsoft\u2019s way of saying &#8216;if we told you any more, we\u2019d give the game away,&#8217;&#8221; Barnett said. &#8220;Accordingly, Microsoft assesses exploitation as more likely.&#8221;<\/p>\n<p>The <a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20February%202025%20Patch%20Tuesday\/31674\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center<\/a> has a handy list of all the Microsoft patches released today, indexed by severity. Windows enterprise administrators would do well to keep an eye on <a href=\"http:\/\/www.askwoody.com\" target=\"_blank\" rel=\"noopener\">askwoody.com<\/a>, which often has the scoop on any patches causing problems.<\/p>\n<p>It&#8217;s getting harder to buy Windows software that isn&#8217;t also bundled with Microsoft&#8217;s flagship Copilot artificial intelligence (AI) feature. Last month Microsoft started bundling Copilot with <strong>Microsoft Office 365<\/strong>, which Redmond has since rebranded as &#8220;<strong>Microsoft 365 Copilot<\/strong>.&#8221; Ostensibly to offset the costs of its substantial AI investments, Microsoft also jacked up prices from 22 percent to 30 percent for upcoming license renewals and new subscribers.<\/p>\n<p>Office-watch.com <a href=\"https:\/\/office-watch.com\/2025\/microsoft-365-classic\/\" target=\"_blank\" rel=\"noopener\">writes<\/a> that existing Office 365 users who are paying an annual cloud license do have the option of &#8220;Microsoft 365 Classic,&#8221; an AI-free subscription at a lower price, but that many customers are not offered the option until they attempt to cancel their existing Office subscription.<\/p>\n<p>In other security patch news, <strong>Apple<\/strong> has shipped iOS 18.3.1, which fixes a\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/122174\">zero day<\/a>\u00a0vulnerability (CVE-2025-24200) that is showing up in attacks.<\/p>\n<p><strong>Adobe<\/strong> has issued security updates that fix a total of 45 vulnerabilities across <strong>InDesign<\/strong>, <strong>Commerce<\/strong>, <strong>Substance 3D<\/strong> <strong>Stager<\/strong>, <strong>InCopy<\/strong>, <strong>Illustrator<\/strong>, <strong>Substance 3D Designer<\/strong> and <strong>Photoshop Elements<\/strong>.<\/p>\n<p><strong>Chris Goettl<\/strong> at <strong>Ivanti<\/strong> notes that <strong>Google Chrome<\/strong> is shipping an update today which will trigger updates for Chromium based browsers including <strong>Microsoft Edge<\/strong>, so be on the lookout for Chrome and Edge updates as we proceed through the week.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2025\/02\/microsoft-patch-tuesday-february-2025-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 12 Feb 2025 04:58:37 +0000<\/strong><\/p>\n<p>Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[29353,11414,2211,31782,32413,32414,32415,11427,32416,32417,10644,15086,15801,20501,20502,16936],"class_list":["post-25807","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adam-barnett","tag-adobe","tag-apple","tag-cve-2024-38193","tag-cve-2025-21377","tag-cve-2025-21391","tag-cve-2025-21418","tag-google-chrome","tag-microsoft-365-copilot","tag-microsoft-patch-tuesday-february-2025","tag-other","tag-rapid7","tag-sans-internet-storm-center","tag-satnam-narang","tag-tenable","tag-time-to-patch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25807"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25807\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}