Article Details
Scrape Timestamp (UTC): 2025-01-15 13:12:38.541
Original Article Text
Click to Toggle View
Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws. Today is Microsoft's January 2025 Patch Tuesday, which includes security updates for 159 flaws, including eight zero-day vulnerabilities, with three actively exploited in attacks. This Patch Tuesday also fixes twelve "Critical" vulnerabilities, including information disclosure, privileges elevation, and remote code execution flaws. The number of bugs in each vulnerability category is listed below: To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5050009 & KB5050021 cumulative updates and the Windows 10 KB5048652 cumulative update. Three actively exploited zero-day disclosed This month's Patch Tuesday fixes three actively exploited and five publicly exposed zero-day vulnerabilities. Microsoft classifies a zero-day flaw as one that is publicly disclosed or actively exploited while no official fix is available. The actively exploited zero-day vulnerability in today's updates are: CVE-2025-21333, CVE-2025-21334, CVE-2025-21335 - Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Microsoft has fixed three elevation of privilege vulnerability in Windows Hyper-V that were exploited in attacks to gain SYSTEM privileges on Windows devices. No information has been released as to how these flaws were exploited in attacks, and they all show that they were disclosed anonymously. As the CVEs for these three vulnerabilities are sequential and for the same feature, they were all likely found used or discovered through the same attacks. The publicly disclosed zero-days are: CVE-2025-21275 - Windows App Package Installer Elevation of Privilege Vulnerability Microsoft fixed an elevation of privileges flaw in the Windows App Package Installer that could lead to SYSTEM privileges. "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," explains Microsoft's advisory. The vulnerability was submitted anonymously to Microsoft. CVE-2025-21308 - Windows Themes Spoofing Vulnerability Microsoft fixed a Windows Theme vulnerability that could be exploited simply by displaying a specially crafted Theme file in Windows Explorer. "An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file.," explains Microsoft's advisory. The flaw was discovered by Blaz Satler with 0patch by ACROS Security, which is a bypass of a previous flaw tracked as CVE-2024-38030. 0patch previously released micropatches for this flaw in October, while waiting for Microsoft to fix it. When a Theme file is viewed in Windows Explorer and utilizes BrandImage and Wallpaper options that specify a network file path, Windows automatically sends authentication requests to the remote host, including the logged-in user's NTLM credentials. These NTLM hashes can then be cracked to get the plain-text password or used in pass-the-hash attacks. Microsoft says the flaw is mitigated if NTLM is disabled or the "Restrict NTLM: Outgoing NTLM traffic to remote servers" policy is enabled. CVE-2025-21186, CVE-2025-21366, CVE-2025-21395 - Microsoft Access Remote Code Execution Vulnerability Microsoft fixed three remote code execution vulnerabilities in Microsoft Access that are exploited when opening specially crafted Microsoft Access documents. Microsoft has mitigated this issue by blocking access to the following Microsoft Access documents if they were sent via email: What makes this interesting is that Unpatched.ai, an AI-assisted vulnerability discovery platform, has discovered all three flaws. Recent updates from other companies Other vendors who released updates or advisories in January 2025 include: The January 2025 Patch Tuesday Security Updates Below is the complete list of resolved vulnerabilities in the January 2025 Patch Tuesday updates. To access the full description of each vulnerability and the systems it affects, you can view the full report here.
Daily Brief Summary
Microsoft's January 2025 Patch Tuesday included updates for 159 vulnerabilities, with 8 critical zero-day flaws, three of which were actively exploited.
Critical issues addressed included elevation of privilege, information disclosure, and remote code execution vulnerabilities.
Three zero-day vulnerabilities in Windows Hyper-V NT Kernel allowed attackers to gain SYSTEM privileges and were patched this cycle.
Another patched zero-day involved a Windows App Package Installer flaw that also allowed elevation to SYSTEM privileges.
A security weakness in Windows Themes was corrected; this could exploit NTLM credentials via specially crafted Theme files.
Microsoft also patched three remote code execution vulnerabilities in Microsoft Access triggered by opening specially crafted documents.
Additional security updates covered various Microsoft products, aiming to enhance system defenses against potential cyber threats.
Other tech companies similarly released updates or advisories as part of their January 2025 security measures.