START FREE
Patch Tuesday

Microsoft Patch Tuesday – March 2025

5 min. read
11/03/2025
By Esben Dochy
Microsoft Patch Tuesday

⚡ TL;DR | Go Straight to the March 202Patch Tuesday Audit Report

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The March 2025 edition of Patch Tuesday brings us 57 new fixes, with 7 rated as critical and 6 exploited. We’ve listed the most important changes below.

Win32 Kernel Subsystem Elevation of Privilege Vulnerability

The first item is a two for one. CVE-2025-24983 and CVE-2025-24044 are both Elevation of Privilege vulnerabilities with a CVSS base score between 7.0 and 7.8. CVE-2025-24983 has been actively exploited, while CVE-2025-24044 is “more likely” to be exploited.

If an attacker successfully exploits the vulnerability, they can gain SYSTEM privileges. Microsoft hasn’t released any further details about how exploitation can take place to limit exposure of unpatched systems.

Microsoft Management Console Security Feature Bypass Vulnerability

Second on the list is CVE-2025-26633 with a CVSS base score of 7. This vulnerability has also been actively exploited, however, exploitation does require user interaction. An attacker would have to convince the user to click a malicious link or open a malicious file.

A security bypass vulnerability in Microsoft Management Console (MMC) could allow an attacker to circumvent security restrictions and gain unauthorized access to administrative tools or system settings. Depending on the severity of the vulnerability, it could lead to privilege escalation, unauthorized system changes, or even full system compromise.

Windows Remote Desktop Services Remote Code Execution Vulnerability

Two critical vulnerabilities have been fixed for the Windows RDS. CVE-2025-24045 and CVE-2025-24035 have a CVSS base score of 8.1 and with the label “Exploitation More Likely”.

Microsoft only provided the following additional information:

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.

Run the Patch Tuesday March 2025 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday March 2025 CVE Codes & Titles

CVE NumberCVE Title
CVE-2025-26645Remote Desktop Client Remote Code Execution Vulnerability
CVE-2025-26633Microsoft Management Console Security Feature Bypass Vulnerability
CVE-2025-26631Visual Studio Code Elevation of Privilege Vulnerability
CVE-2025-26630Microsoft Access Remote Code Execution Vulnerability
CVE-2025-26629Microsoft Office Remote Code Execution Vulnerability
CVE-2025-26627Azure Arc Installer Elevation of Privilege Vulnerability
CVE-2025-25008Windows Server Elevation of Privilege Vulnerability
CVE-2025-25003Visual Studio Elevation of Privilege Vulnerability
CVE-2025-24998Visual Studio Elevation of Privilege Vulnerability
CVE-2025-24997DirectX Graphics Kernel File Denial of Service Vulnerability
CVE-2025-24996NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-24995Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2025-24994Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
CVE-2025-24993Windows NTFS Remote Code Execution Vulnerability
CVE-2025-24992Windows NTFS Information Disclosure Vulnerability
CVE-2025-24991Windows NTFS Information Disclosure Vulnerability
CVE-2025-24988Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2025-24987Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2025-24986Azure Promptflow Remote Code Execution Vulnerability
CVE-2025-24985Windows Fast FAT File System Driver Remote Code Execution Vulnerability
CVE-2025-24984Windows NTFS Information Disclosure Vulnerability
CVE-2025-24983Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2025-24084Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
CVE-2025-24083Microsoft Office Remote Code Execution Vulnerability
CVE-2025-24082Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-24081Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-24080Microsoft Office Remote Code Execution Vulnerability
CVE-2025-24079Microsoft Word Remote Code Execution Vulnerability
CVE-2025-24078Microsoft Word Remote Code Execution Vulnerability
CVE-2025-24077Microsoft Word Remote Code Execution Vulnerability
CVE-2025-24076Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
CVE-2025-24075Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-24072Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
CVE-2025-24071Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2025-24070ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
CVE-2025-24067Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-24066Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-24064Windows Domain Name Service Remote Code Execution Vulnerability
CVE-2025-24061Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2025-24059Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-24057Microsoft Office Remote Code Execution Vulnerability
CVE-2025-24056Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-24055Windows USB Video Class System Driver Information Disclosure Vulnerability
CVE-2025-24054NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-24051Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-24050Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2025-24049Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
CVE-2025-24048Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2025-24046Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-24045Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2025-24044Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2025-24043WinDbg Remote Code Execution Vulnerability
CVE-2025-24036Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
CVE-2025-24035Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2025-21247MapUrlToZone Security Feature Bypass Vulnerability
CVE-2025-21199Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
CVE-2025-21180Windows exFAT File System Remote Code Execution Vulnerability
CVE-2024-9157Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
CVE-2024-49116Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-30098Windows Cryptographic Services Security Feature Bypass Vulnerability
CVE-2022-30170Windows Credential Roaming Service Elevation of Privilege Vulnerability
NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.