Microsoft started the year 2025 by addressing a significant number of security vulnerabilities, with a total of 161 flaws across its software. Among these, 11 vulnerabilities were rated as Critical, while 149 were rated as Important. Notably, the update includes fixes for three zero-day vulnerabilities in Windows Hyper-V, which have been actively exploited in real-world attacks. These flaws were related to privilege escalation and could allow attackers to gain SYSTEM privileges. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added them to its Known Exploited Vulnerabilities catalog, urging federal agencies to apply the fixes by February 4, 2025.
Hyper-V vulnerabilities, Microsoft addressed several other critical issues
In addition to the Hyper-V vulnerabilities, Microsoft addressed several other critical issues, including five remote code execution (RCE) vulnerabilities. Among these were flaws in the Microsoft Digest Authentication mechanism, SPNEGO Extended Negotiation, and Windows Object Linking and Embedding (OLE). The vulnerabilities could be exploited through specially crafted emails or malicious file attachments, which could lead to attackers executing code remotely or gaining unauthorized access to systems. Microsoft also recommended using Microsoft Outlook and reading emails in plain text format to reduce the risk of these exploits.
Another major part of the update involved addressing vulnerabilities in Microsoft’s Access software and its Chromium-based Edge browser. Some of these flaws, particularly in Access, were categorized as remote code execution vulnerabilities. Exploiting these would require a user to open a specially crafted file. Other issues were resolved in Windows App Package Installer and Windows Themes, with one vulnerability previously flagged as a bypass for an earlier 2024 security flaw. This highlights the ongoing challenge of securing software and maintaining safe systems against evolving threats.
To safeguard against these vulnerabilities, Microsoft has urged all users to apply the latest security patches immediately. This includes applying updates to mitigate email-related threats and file-handling vulnerabilities. Given the high number of flaws addressed and their potential for exploitation, it is crucial for organizations to remain proactive about security. By updating software and maintaining vigilance, organizations can reduce the risk of breaches and ensure that their systems stay secure.