Microsoft Today is released updates to connect at least 121 security holes Windows Apps and software, including some of the most vulnerable risks in the wild. The Eleven of those mistakes receive a major “critical” rating “, meaning malware or imalcontents can be less exploit without contacting the Windows users.
Zero-Day Fice is already exploited by CVE-2025-29824, the height of the bug right in the window The standard log file system (CLFS) driver. Microsoft puts as “important,” but Chris gootl from the Diamenti Expressing, risky warnings based on the risk is cure as criticizing.
This Windows CLFS section is not a stranger to amend on Tuesday: According to Tenable Satnam NarangSince 2022 Microsoft held the risk of 32 CLFs CLFs CLFS CLFS on the day was rolled on December 2024.
Narang commented that when mistakes allowed the attackers to include the highest quality code of operation on Tuesday, details are returned after zero days exploitation.
“The last two years, the right elevation of the right to lead the package and, so far in 2025, the account over half of Zero days,” wrote Narang.
Rapid7’s Adam Barnett warns that any Windows Defenders are responsible for LDAP server – which means any relative to Microsoft Footprint conference – must not login With a critical mistake of CVE-2025-26663 in their list of things to do.
“No applications have no need for user interaction, and the murder of Code to be thought to be a LDAP Server status of any appeal to any attacker,” said Barnettett. “Anyone who was wondered if today we were reunited on December 2024 Amend Tuesday It may take less comfort for the worst LDAPs of LDAP published by the end of the past year may be exploit than today’s atcher, because the attacker won a race. Besides, Microsoft is still expecting bullying more likely. “
Among the critical update Microsoft Patched this month is a long cock in the execution code Windows Remote Desktop Services (RDP), including CVE 2025-26671, CVE-2025-27480 Necv-2025-27482; Only two two are measured “criticizing,” and Microsoft marks both of them “abuse is possible.”
Perhaps the fullest fixed risk this month was in web browsers. Google Chrome Updated to correct 13 errors this week, and Mozilla Firefox Eight bugs, probably many reviews come later this week Microsoft Edge.
As they usually do in patch on Tuesday, Adobe issued 12 updates to solve 54 security holes of the variety of products, including Avenue, Adobe commercials, Experience Forms Manager, After results, Media Encoder, Bridge, Premiere Pro, Pin, Enter enthusiasm, AEM Screensbeside Mkrameker.
apple Users may need to be properly installed. On March 31, Apple issued a large update of security (more than three gigabytes) to adjust the various products for their products, including at least one zero error.
And in case you missed, on March 31, 2025 apple extracted a large batch of security update of some type of their products, from Macos in IOS Practical applications games including IPads.
Earlier today, Microsoft has entered the note Windows 10 Security updates were not available but it could be released as soon as possible. It appears from browsing askwoody.com that this Snar has been developed. Any way, if you enter problems using any of these updates please leave a note so in the comments below, because the potential for someone else had the same problem.
As before, please check support your data and or devices before renewal, which makes it very difficult to adjust the software update. For many granular detail in modern patch on Tuesday, check the Shipment of the SANS Internet Storm Internet Internet center. Microsoft update guide on April 2025 is here.
For more details in a patch on Tuesday, check writing from Action1 and AutomPion.
Source link