{"id":25829,"date":"2025-05-15T10:15:40","date_gmt":"2025-05-15T18:15:40","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/05\/15\/news-19549\/"},"modified":"2025-05-15T10:15:40","modified_gmt":"2025-05-15T18:15:40","slug":"news-19549","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/05\/15\/news-19549\/","title":{"rendered":"Patch Tuesday, April 2025 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 09 Apr 2025 03:09:36 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released updates to plug at least 121 security holes in its <strong>Windows<\/strong> operating systems and software, including one vulnerability that is already being exploited in the wild. Eleven of those flaws earned Microsoft&#8217;s most-dire &#8220;critical&#8221; rating, meaning malware or malcontents could exploit them with little to no interaction from Windows users.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"750\" height=\"528\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>The zero-day flaw already seeing exploitation is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29824\" target=\"_blank\" rel=\"noopener\">CVE-2025-29824<\/a>, a local elevation of privilege bug in the Windows <strong>Common Log File System<\/strong> (CLFS) driver.\u00a0 Microsoft rates it as &#8220;important,&#8221; but as <strong>Chris Goettl<\/strong> from <strong>Ivanti<\/strong> points out, risk-based prioritization warrants treating it as critical.<\/p>\n<p>This CLFS component of Windows is no stranger to Patch Tuesday: According to Tenable&#8217;s <strong>Satnam Narang<\/strong>, since 2022 Microsoft has patched 32 CLFS vulnerabilities &#8212; averaging 10 per year &#8212; with six of them exploited in the wild. The <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49138\" target=\"_blank\" rel=\"noopener\">last CLFS zero-day<\/a> was <a href=\"https:\/\/krebsonsecurity.com\/2024\/12\/patch-tuesday-december-2024-edition\/\" target=\"_blank\" rel=\"noopener\">patched in December 2024<\/a>.<\/p>\n<p>Narang notes that while flaws allowing attackers to install arbitrary code are consistently top overall Patch Tuesday features, the data is reversed for zero-day exploitation.<\/p>\n<p>&#8220;For the past two years, elevation of privilege flaws have led the pack and, so far in 2025, account for over half of all zero-days exploited,&#8221; Narang wrote.<span id=\"more-70933\"><\/span><\/p>\n<p>Rapid7&#8217;s <strong>Adam Barnett<\/strong> warns that any Windows defenders responsible for an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Lightweight_Directory_Access_Protocol\" target=\"_blank\" rel=\"noopener\">LDAP server<\/a> \u2014 which means almost any organization with a non-trivial Microsoft footprint \u2014 should add <span class=\"il\">patching<\/span> for the critical flaw <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26663\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26663&amp;source=gmail&amp;ust=1744231709116000&amp;usg=AOvVaw3moAqrbzoHqolAikc6dYLo\">CVE-2025-26663<\/a>\u00a0to their to-do list.<\/p>\n<p>&#8220;With no privileges required, no need for user interaction, and code execution presumably in the context of the LDAP server itself, successful exploitation would be an attractive shortcut to any attacker,&#8221; Barnett said. &#8220;Anyone wondering if today is a re-run of December 2024 <span class=\"il\">Patch<\/span>\u00a0<span class=\"il\">Tuesday<\/span>\u00a0can take some small solace in the fact that the worst of the\u00a0<a href=\"https:\/\/www.rapid7.com\/blog\/post\/2024\/12\/10\/patch-tuesday-december-2024\/#ldap-critical-rce\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.rapid7.com\/blog\/post\/2024\/12\/10\/patch-tuesday-december-2024\/%23ldap-critical-rce&amp;source=gmail&amp;ust=1744231709116000&amp;usg=AOvVaw2C4e66FL53_LrZBhrndLUw\">trio of LDAP critical RCEs published at the end of last year<\/a>\u00a0was likely easier to exploit than today\u2019s example, since today\u2019s\u00a0CVE-2025-26663 requires that an attacker win a race condition. Despite that, Microsoft still expects that exploitation is more likely.&#8221;<\/p>\n<p>Among the critical updates Microsoft patched this month are remote code execution flaws in <strong>Windows Remote Desktop <\/strong>services\u00a0(RDP), including <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26671\" target=\"_blank\" rel=\"noopener\">CVE-2025-26671<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27480\" target=\"_blank\" rel=\"noopener\">CVE-2025-27480<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27482\" target=\"_blank\" rel=\"noopener\">CVE-2025-27482<\/a>; only the latter two are rated &#8220;critical,&#8221; and Microsoft marked both of them as \u201cExploitation More Likely.&#8221;<\/p>\n<p>Perhaps the most widespread vulnerabilities fixed this month were in web browsers. <strong>Google Chrome<\/strong> <a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noopener\">updated<\/a> to fix 13 flaws this week, and <strong>Mozilla Firefox <\/strong>fixed <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2025-20\/\" target=\"_blank\" rel=\"noopener\">eight bugs<\/a>, with possibly more updates coming later this week for <strong>Microsoft<\/strong> <strong>Edge<\/strong>.<\/p>\n<p>As it tends to do on Patch Tuesdays, <strong>Adobe<\/strong> has <a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html\" target=\"_blank\" rel=\"noopener\">released 12 updates<\/a> resolving 54 security holes across a range of products, including <strong>ColdFusion<\/strong>, <strong>Adobe Commerce<\/strong>, <strong>Experience Manager Forms<\/strong>, <strong>After Effects<\/strong>, <strong>Media Encoder<\/strong>, <strong>Bridge<\/strong>,\u00a0<strong>Premiere Pro<\/strong>, <strong>Photoshop<\/strong>, <strong>Animate<\/strong>, <strong>AEM Screens<\/strong>, and <strong>FrameMaker<\/strong>.<\/p>\n<p><strong>Apple<\/strong> users may need to patch as well. On March 31, Apple released a huge security update (more than three gigabytes in size) to fix issues in a range of their products, including <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-backports-zero-day-patches-to-older-iphones-and-macs\/\" target=\"_blank\" rel=\"noopener\">at least one zero-day flaw<\/a>.<\/p>\n<p>And in case you missed it, on March 31, 2025 <strong>Apple<\/strong> released <a href=\"https:\/\/support.apple.com\/en-us\/100100?is=1ef7934f6635b02395adcab09a0c1b24bf0ea745b648bfe87189de8aadc7300b\" target=\"_blank\" rel=\"noopener\">a rather large batch of security updates<\/a> for a wide range of their products, from <strong>macOS<\/strong> to the<strong> iOS<\/strong> operating systems on <strong>iPhones<\/strong> and <strong>iPads<\/strong>.<\/p>\n<p>Earlier today, Microsoft included a note saying <strong>Windows 10<\/strong> security updates weren&#8217;t available but would be released as soon as possible. It appears from browsing <a href=\"https:\/\/www.askwoody.com\/2025\/april-2025-updates-out\/\" target=\"_blank\" rel=\"noopener\">askwoody.com<\/a> that this snafu has since been rectified. Either way, if you run into complications applying any of these updates please leave a note about it in the comments below, because the chances are good that someone else had the same problem.<\/p>\n<p>As ever, please consider backing up your data and or devices prior to updating, which makes it far less complicated to undo a software update gone awry. For more granular details on today&#8217;s Patch Tuesday, check out the <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft%20April%202025%20Patch%20Tuesday\/31838\/\">SANS Internet Storm Center&#8217;s roundup<\/a>. Microsoft&#8217;s update guide for April 2025 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Apr\" target=\"_blank\" rel=\"noopener\">is here<\/a>.<\/p>\n<p>For more details on Patch Tuesday, check out the write-ups from <a href=\"https:\/\/www.action1.com\/patch-tuesday\/patch-tuesday-april-2025\/?vyj\" target=\"_blank\" rel=\"noopener\">Action1<\/a> and\u00a0<a href=\"https:\/\/www.automox.com\/blog\/patch-tuesday-april-2025\" target=\"_blank\" rel=\"noopener\">Automox<\/a>.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2025\/04\/patch-tuesday-april-2025-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 09 Apr 2025 03:09:36 +0000<\/strong><\/p>\n<p>Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being exploited in the wild. Eleven of those flaws earned Microsoft&#8217;s most-dire &#8220;critical&#8221; rating, meaning malware or malcontents could exploit them with little to no interaction from Windows users.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[17774,32482,32483,32484,32485,32486,32487,14947,16888,10516,20501,17220,17061,16936,10525,32488],"class_list":["post-25829","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-chris-goettl","tag-clfs","tag-common-log-file-system","tag-cve-2025-26671","tag-cve-2025-27480","tag-cve-2025-27482","tag-cve-2025-29824","tag-ivanti","tag-latest-warnings","tag-microsoft","tag-satnam-narang","tag-security-tools","tag-the-coming-storm","tag-time-to-patch","tag-windows","tag-windows-remote-desktop-services"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25829"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25829\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}