Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 30, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 30, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 30, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 30, 2025

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025

      The Witcher 3: Wild Hunt reaches 60 million copies sold as work continues on The Witcher 4

      May 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How Remix is shaking things up

      May 30, 2025
      Recent

      How Remix is shaking things up

      May 30, 2025

      Perficient at Kscope25: Let’s Meet in Texas!

      May 30, 2025

      Salesforce + Informatica: What It Means for Data Cloud and Our Customers

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025
      Recent

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Microsoft January 2025 Patch Tuesday: 8 Zero-Days, 3 Actively Exploited

    Microsoft January 2025 Patch Tuesday: 8 Zero-Days, 3 Actively Exploited

    January 14, 2025

    Microsoft January 2025 Patch Tuesday

    Microsoft’s Patch Tuesday update for January 2025 patches 159 vulnerabilities, including eight zero-days, three of which are being actively exploited.

    The Microsoft January 2025 Patch Tuesday release note designated 17 of the 159 vulnerabilities as “exploitation more likely,” in addition to the three marked “exploitation detected.”

    Hyper-V Vulnerabilities Under Attack

    There is little information on the three Elevation of Privilege vulnerabilities under active attack, which affect Windows Hyper-V NT Kernel Integration VSP. The researcher who reported the vulnerabilities remains anonymous. Attackers who successfully exploit the vulnerability could gain SYSTEM privileges, Microsoft noted.

    The three vulnerabilities are:

    CVE-2025-21333: A 7.8-severity Heap-Based Buffer Overflow vulnerability

    CVE-2025-21334: A 7.8-severity Use After Free vulnerability

    CVE-2025-21335: A 7.8-severity Use After Free vulnerability

    Other Zero-Days in January 2025 Patch Tuesday

    The other zero-days in the January 2025 Patch Tuesday update include:

    CVE-2025-21275: A 7.8-severity Windows App Package Installer Elevation of Privilege vulnerability that Microsoft has judged “less likely” to be exploited.

    CVE-2025-21308: A 6.5-rated Windows Themes Spoofing Vulnerability that affects systems with NTLM enabled. Microsoft credits Blaz Satler of 0patch by ACROS Security for the find. Microsoft notes that “An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file.”

    CVE-2025-21186, CVE-2025-21366 and CVE-2025-21395 are 7.8-severity Microsoft Access Remote Code Execution vulnerabilities that Microsoft judges to be at lower risk of exploit. What may be most noteworthy about the vulnerabilities is that they’re attributed to the Unpatched.ai vulnerability discovery platform.

    Other High-Risk Microsoft Vulnerabilities

    The 17 vulnerabilities at greater risk for exploit but not under active attack include:

    • CVE-2025-21189, CVE-2025-21219, CVE-2025-21268, CVE-2025-21328 and CVE-2025-21329: all are 4.3-severity MapUrlToZone Security Feature Bypass vulnerabilities
    • CVE-2025-21210: a 4.2-severity Windows BitLocker Information Disclosure vulnerability
    • CVE-2025-21269: a 4.3-rated Windows HTML Platforms Security Feature Bypass vulnerability
    • CVE-2025-21292: an 8.8-severity Windows Search Service Elevation of Privilege vulnerability
    • CVE-2025-21298: a 9.8-severity Windows OLE Remote Code Execution vulnerability
    • CVE-2025-21299: a 7.1-rated Windows Kerberos Security Feature Bypass vulnerability
    • CVE-2025-21309: an 8.1-rated Windows Remote Desktop Services Remote Code Execution vulnerability
    • CVE-2025-21314: A 6.5-severity Windows SmartScreen Spoofing vulnerability
    • CVE-2025-21315: A 7.8-rated Microsoft Brokering File System Elevation of Privilege vulnerability
    • CVE-2025-21354, CVE-2025-21362 and CVE-2025-21365: 7.8-severity Microsoft Excel Remote Code Execution vulnerabilities
    • CVE-2025-21364: a 7.8-rated Microsoft Excel Security Feature Bypass vulnerability.

    Other Patch Tuesday Releases: Fortinet, Ivanti and More

    Patch Tuesday isn’t limited to Microsoft, as the second Tuesday of each month also sees patch releases from many other vendors.

    Some of the other noteworthy updates coming out today include patches from Adobe, Fortinet, Ivanti, SAP, SonicWall and Zyxel.

    The blizzard of patch releases kept CISA busy too, as the agency added Hyper-V and Fortinet (CVE-2024-55591) vulnerabilities to its Known Exploited Vulnerabilities catalog.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLeveraging an Operational Data Layer for Telco Success
    Next Article Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation

    Related Posts

    Security

    China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    May 30, 2025
    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 30, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Learn LangGraph and Build Conversational AI with Python

    Development

    Exclusive interview with Raspberry Pi CEO: New $70 AI kit ‘a watershed moment for us’

    Development

    CVE-2025-4023 – iSourcecode Placement Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    AmbientGPT: An Open-Source and Multimodal MacOS Foundation Model GUI

    Development

    Highlights

    Intel Lunar Lake NPU Brings 48 TOPS of AI Acceleration

    June 5, 2024

    Competition for AI speed heats up. Plus, the first of the two new Xeon 6…

    Slack delivers native and secure generative AI powered by Amazon SageMaker JumpStart

    April 18, 2024

    Microsoft Researchers Present a Novel Implementation of MH-MoE: Achieving FLOPs and Parameter Parity with Sparse Mixture-of-Experts Models

    November 29, 2024

    LuLu Hypermarket Data Breach Reportedly Affects 196,000 Customers in IntelBroker-Led Cyberattack

    July 11, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.