New Microsoft Patch Fixes 63 Flaws Effective Feb 11

microsoft

In an era where digital security is paramount, Microsoft has just dropped a bombshell with its February 2025 Patch Tuesday update, addressing a staggering 63 vulnerabilities across its vast ecosystem of software products.

This update isn’t just another routine patch; it includes fixes for two critical vulnerabilities already under active exploitation in the wild.

Here’s everything you need to know to safeguard your systems and understand the implications of these security breaches.

The Severity of the Flaws

Among the vulnerabilities patched, three are classified as Critical, with the majority, 57, labeled Important, one Moderate, and two Low.

This distribution underscores the breadth of threats facing users today, from critical system breaches to less severe but still significant security risks.

Actively Exploited Vulnerabilities

1. CVE-2025-21391 – Windows Storage Elevation of Privilege Vulnerability:

CVSS Score: 7.1

Description: This flaw allows an attacker to delete targeted files on a system, potentially disrupting service availability without disclosing confidential information.

Microsoft warns that while this might not seem like a data breach, it could be chained with other vulnerabilities to escalate privileges, making recovery efforts more complex and potentially erasing forensic evidence.

2. CVE-2025-21418 – Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability:

CVSS Score: 7.8

Description: This vulnerability pertains to a privilege escalation within the AFD.sys driver, offering attackers the chance to gain SYSTEM level privileges.

This is particularly alarming given its similarity to a previously exploited flaw (CVE-2024-38193) by the notorious Lazarus Group, known for North Korean state-sponsored cyber activities.

The current exploitation of CVE-2025-21418 has not been definitively linked to any specific group, but its severity cannot be understated.

Other Noteworthy Vulnerabilities

3. CVE-2025-21198 – Remote Code Execution in HPC Pack:

CVSS Score: 9.0

Details: This is the highest-rated vulnerability in this batch, allowing for remote code execution through a malicious HTTPS request aimed at HPC Pack head or compute nodes.

This could lead to unauthorized access to other connected clusters or nodes, posing a significant threat to enterprise environments.

4. CVE-2025-21376 – LDAP Remote Code Execution:

CVSS Score: 8.1

Explanation: This flaw in LDAP could lead to arbitrary code execution if an attacker wins a race condition, potentially affecting the core of Active Directory services, which are central to authentication and access control in many organizations.

5. CVE-2025-21377 – NTLMv2 Hash Disclosure:

CVSS Score: 6.5

Impact: This vulnerability could allow attackers to capture NTLMv2 hashes, opening doors to unauthorized authentication as the targeted user.

The Broader Impact and Response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added these vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch by March 4, 2025.

This action reflects the urgency and severity with which these issues are viewed at the highest levels of government.

Beyond Microsoft: A Patchwork of Security Updates

This isn’t just a Microsoft story; the tech landscape is awash with patches.

Numerous vendors from Adobe to Zoom have also released updates over the past weeks, addressing vulnerabilities across a spectrum of products:

Adobe with updates for its creative suite,

Amazon Web Services, ensuring cloud infrastructure security,

Apple, securing iOS, macOS, and more,

Cisco with network device fixes,

Google tackling issues in Android, Chrome, and its cloud services,

Intel and AMD for hardware-related software,

Linux distributions with patches for various distributions,

Mozilla with updates for Firefox and Thunderbird,

This collective action highlights a broader, industry-wide initiative to close security gaps, making this a pivotal moment in cybersecurity for 2025.

As we move deeper into 2025, the landscape of cybersecurity is more volatile than ever.

This latest round of patches from Microsoft and others serves as a stark reminder of the continuous battle against cyber threats.

Users, IT administrators, and security professionals must stay vigilant, apply these patches immediately, and continue educating themselves on emerging threats.

Are you ready to protect your digital life from these known and unknown dangers?

Remember, while this article aims to inform and raise awareness, always verify information from trusted sources and consult with cybersecurity experts for tailored advice to your specific environment.

Stay updated with Loud Updates.

Discover more from Loud Updates

Subscribe now to keep reading and get access to the full archive.

Continue reading

32,000 Statistics Canada Jobs Now Hiring Across Canada For 2026

Top 5 Canada Permanent Residency Pathways In 2026

New CPP Payments To Be Sent Canada-Wide On January 28, With An Increase

All The CRA Tax Deadlines For 2026 and Important Updates