Microsoft as we speak launched updates to plug at the very least 121 safety holes in its Home windows working techniques and software program, together with one vulnerability that’s already being exploited within the wild. Eleven of these flaws earned Microsoft’s most-dire “crucial” ranking, which means malware or malcontents might exploit them with little to no interplay from Home windows customers.
The zero-day flaw already seeing exploitation is CVE-2025-29824, an area elevation of privilege bug within the Home windows Frequent Log File System (CLFS) driver. Microsoft charges it as “essential,” however as Chris Goettl from Ivanti factors out, risk-based prioritization warrants treating it as crucial.
This CLFS element of Home windows is not any stranger to Patch Tuesday: In accordance with Tenable’s Satnam Narang, since 2022 Microsoft has patched 32 CLFS vulnerabilities — averaging 10 per yr — with six of them exploited within the wild. The final CLFS zero-day was patched in December 2024.
Narang notes that whereas flaws permitting attackers to put in arbitrary code are persistently prime general Patch Tuesday options, the info is reversed for zero-day exploitation.
“For the previous two years, elevation of privilege flaws have led the pack and, to this point in 2025, account for over half of all zero-days exploited,” Narang wrote.
Rapid7’s Adam Barnett warns that any Home windows defenders answerable for an LDAP server — which implies virtually any group with a non-trivial Microsoft footprint — ought to add patching for the crucial flaw CVE-2025-26663 to their to-do checklist.
“With no privileges required, no want for consumer interplay, and code execution presumably within the context of the LDAP server itself, profitable exploitation could be a sexy shortcut to any attacker,” Barnett mentioned. “Anybody questioning if as we speak is a re-run of December 2024 Patch Tuesday can take some small solace in the truth that the worst of the trio of LDAP crucial RCEs printed on the finish of final yr was possible simpler to take advantage of than as we speak’s instance, since as we speak’s CVE-2025-26663 requires that an attacker win a race situation. Regardless of that, Microsoft nonetheless expects that exploitation is extra possible.”
Among the many crucial updates Microsoft patched this month are distant code execution flaws in Home windows Distant Desktop companies (RDP), together with CVE-2025-26671, CVE-2025-27480 and CVE-2025-27482; solely the latter two are rated “crucial,” and Microsoft marked each of them as “Exploitation Extra Seemingly.”
Maybe essentially the most widespread vulnerabilities fastened this month had been in internet browsers. Google Chrome up to date to repair 13 flaws this week, and Mozilla Firefox fastened eight bugs, with probably extra updates coming later this week for Microsoft Edge.
Because it tends to do on Patch Tuesdays, Adobe has launched 12 updates resolving 54 safety holes throughout a variety of merchandise, together with ColdFusion, Adobe Commerce, Expertise Supervisor Types, After Results, Media Encoder, Bridge, Premiere Professional, Photoshop, Animate, AEM Screens, and FrameMaker.
Apple customers could must patch as effectively. On March 31, Apple launched an enormous safety replace (greater than three gigabytes in dimension) to repair points in a variety of their merchandise, together with at the very least one zero-day flaw.
And in case you missed it, on March 31, 2025 Apple launched a reasonably giant batch of safety updates for a variety of their merchandise, from macOS to the iOS working techniques on iPhones and iPads.
Earlier as we speak, Microsoft included a observe saying Home windows 10 safety updates weren’t out there however could be launched as quickly as attainable. It seems from shopping askwoody.com that this snafu has since been rectified. Both approach, if you happen to run into problems making use of any of those updates please go away a observe about it within the feedback under, as a result of the probabilities are good that another person had the identical drawback.
As ever, please think about backing up your knowledge and or units previous to updating, which makes it far simpler to undo a software program replace gone awry. For extra granular particulars on as we speak’s Patch Tuesday, try the SANS Web Storm Middle’s roundup. Microsoft’s replace information for April 2025 is right here.
For extra particulars on Patch Tuesday, try the write-ups from Action1 and Automox.