Microsoft has released a patch addressing 63 vulnerabilities, following a previous update that fixed 159 flaws. The vulnerabilities are categorized by severity: critical, important, moderate, and low. Three critical vulnerabilities requiring user action are:
- CVE-2025-21376: Affects Windows LDAP, allowing remote control of systems using Active Directory.
- CVE-2025-21379: Pertains to potential Man-in-the-Middle attacks, enabling attackers to manipulate communications and steal data.
- CVE-2025-21381: Can be exploited by tricking users into downloading malicious files, allowing arbitrary code execution.
Two zero-day vulnerabilities already under exploitation are:
- CVE-2025-21391: Allows attackers to bypass access controls and delete files.
- CVE-2025-21418: Enables attackers to gain system privileges for configuration and user management.
Other notable vulnerabilities include:
- CVE-2025-21194: A hypervisor vulnerability that could compromise the kernel.
- CVE-2025-21377: Could expose NTLM hashes, allowing impersonation of users.
- CVE-2025-21198: Affects Microsoft's HPC systems, allowing complete control through a malicious web request, with a high CVSS score of 9.0.
Users are advised to update Windows to safeguard their systems.