Microsoft patch on Tuesday, February 2025 Edition – Active Krobs

Microsoft Today security updates are issued for at least 56 risks in its operating systems and supported software, including two Zero-Day errors are actively exploiting.

All applicable Windows programs will receive an update this month for abundance of abundant abundance of the name Catchy CVE 2025-21418. This patch should be the most important thing for businesses, as Microsoft says it is exploited, with low invasion complexity, and there are no need for user interaction.

Classical High Human Research Engineers Satnam Narang It is noted that since 2022, there is nine elevation of the same Windows – three years per year – including 2024 that were abused in the wild as zero day (CVE-2024-38193).

“CVE-2024-38193 was unblated by North Korea Apt Group to conceal a new FuDmodule Rootkit’s new format to continue persisting and undermining the postponed programs,” said Narang. “During this time, CVE 2025-21418 was also bullied by Lazarus Group.”

Another Zero Day, CVE-2025-21391, is an accidental risk factor in the Windows Starage used to delete files in the intended program. Microsoft’s Advisory On This Bug References Some 59: Improper Link Resolution Before File Access, “Says and User Inter Interections, and That The Complexity is low.

Adam Barnettleading a software engineer at RAPID7He said the advice on a little accessible information, and provided a clear verification of the ‘attacker will only remove the impact files in the process.

“Long ago, Wed Researchers appoint How a moving attacker was able to remove the disposal file of the full system using figurative strategies,” wrote Barnettett.

One organized risks today is publicly exposed by the CVE-2025-21377, another weaknesses that would permit the attacker to raise their rights in the endangered Windows program. Specifically, this is yet another Windows Fish that can be used to steal the NTLMV2 hashes – actually allowing an attacker to confirm as the target user without logging.

According to Microsoft, a small user interactions with a malicious file is required to exploit CVE 2025-21377, including select, test or “action without opening or making the file.

“This trademark of the language of languages ​​and languages ​​can be a Microsoft brand and tell you, we can offer a game, ‘Ideally, Microsoft examines the abuse is more likely.”

The Sens Internet Storm Attendance has the active list of all Microsoft Patches issued today, shown in difficulties. Windows Enterprise Ethnterprise management Officers can do well by keeping eye on an Inkwoody.com, which usually has a scoop in any of the problems that cause problems.

It is increasingly difficult to buy Windows Software that is not included in Microsoft’s Flagship Copilot ArtilInInishInItilate (AI). Last month Microsoft started Copilot with Microsoft Office 365The Redmond left again restarted “Microsoft 365 Copilot. “Obviously to prepare the cost of its high AI, Microsoft is also responsible for the prices from 22% to 30 percent renewal and new subscribers.

The Khovefed-watch.com is written that 365 offices pay the annual Classic’s license.

For some security issues, apple You have sent IOS 18.3.1, repairs to Zero (CVE-2025-24200) which indicates the attack.

Adobe He has issued security updates that fix the total 45 hazard across Indesign, Commerce, Drugs 3D Compane, -Everesty, Announcement, 3D composer of 3D including Pictoshop items.

Chris gootl at Diamenti Notes that Google Chrome Sending an update today to cause the Chromium-based browsers including Microsoft edgeSo be aware of Chrome and EDGE updates as we continue on Sunday.


Source link