New Microsoft Alert — Update Windows 10 And 11 Now, Attacks Underway

In a striking turn of events within the cybersecurity landscape, Google has rolled out an emergency update for Chrome users, addressing a critical security vulnerability. Simultaneously, Microsoft has issued its own urgent security warning regarding a newly discovered zero-day vulnerability in the Windows Kernel, which poses a significant risk by allowing attackers to gain system privileges. The urgency is palpable: users are advised to update their systems without delay.

Update Windows Now As Microsoft Confirms Kernel Zero-Day Attacks

The latest installment of the ongoing cybersecurity saga, often referred to as Patch Tuesday, has unveiled a staggering 63 vulnerabilities. Among these, one particular flaw has garnered attention: CVE-2025-62215, a zero-day vulnerability actively exploited within the Windows Kernel. According to Satnam Narang, a senior staff research engineer at Tenable, this vulnerability has already been targeted by attackers in the wild. “While exploitation requires an attacker to win a race condition,” Narang explained, “Microsoft confirmed that this vulnerability has been actively exploited.”

Narang further elaborated that CVE-2025-62215 is a privilege escalation flaw, typically utilized in post-exploitation scenarios following initial access through phishing, social engineering, or other vulnerabilities. The official Microsoft security advisory has detailed that “concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Kernel allows an authorized attacker to elevate privileges locally.” The implications of this vulnerability are profound, as it is likely to impact nearly every asset running Microsoft software.

Adam Barnett, lead software engineer at Rapid7, noted that if conditions align favorably for an attacker, the potential outcome could be remote code execution as system via the network, all without needing an existing foothold. Fortunately, while the fix is available, Barnett does not consider CVE-2025-60724 to be wormable. Nonetheless, he emphasizes that addressing this vulnerability should be a top priority for anyone navigating this month’s patches.

The root cause of this vulnerability, as confirmed by Microsoft, appears to stem from CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization, and CWE-415: Double Free. Ben McCarthy, lead cyber security engineer at Immersive, cautioned that these two conditions combined allow an attacker with low-privilege local access to execute a specially crafted application that repeatedly attempts to trigger the race condition. The objective is to manipulate multiple threads interacting with a shared kernel resource in an unsynchronized manner, thereby confusing the kernel’s memory management and leading to the same memory block being freed twice.

This sequence of events results in kernel heap corruption, enabling the attacker to overwrite memory and hijack the system execution flow. In simpler terms, this translates to a significant security threat. As Jason Soroko, senior fellow at Sectigo, succinctly put it, “CVE-2025-62215 does not open the door by itself; it flings it wide once an attacker is inside.”

Winsage
New Microsoft Alert — Update Windows 10 And 11 Now, Attacks Underway