Microsoft Monthly Security Update (February 2025)
Release Date:
12 Feb 2025
537
Views
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
![TYPE: Windows OS](/f/bulletin_type/100000/37p37/operation-system-windowsos.png)
Microsoft has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes |
Azure | ![]() | Elevation of Privilege Remote Code Execution | |
Developer Tools | ![]() | Elevation of Privilege Remote Code Execution | |
Windows | ![]() | Denial of Service Remote Code Execution Elevation of Privilege Data Manipulation Security Restriction Bypass Spoofing | CVE-2025-21391 and CVE-2025-21418 are being exploited in the wild. An attacker with local and user privileges could perform elevation of privilege on the targeted system. |
Extended Security Updates (ESU) | ![]() | Denial of Service Remote Code Execution Elevation of Privilege Security Restriction Bypass Spoofing | CVE-2025-21391 and CVE-2025-21418 are being exploited in the wild. An attacker with local and user privileges could perform elevation of privilege on the targeted system. |
Microsoft Office | ![]() | Information Disclosure Elevation of Privilege Remote Code Execution | |
Mariner | ![]() | Remote Code Execution | |
Apps | ![]() | Spoofing Elevation of Privilege | |
Microsoft Dynamics | ![]() | Elevation of Privilege | |
Browser | ![]() | Remote Code Execution Spoofing | |
Device | ![]() | Security Restriction Bypass |
Number of 'Extremely High Risk' product(s): 0
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 10
Number of 'Low Risk' product(s): 0
Evaluation of overall 'Risk Level': Medium Risk
Impact
- Elevation of Privilege
- Remote Code Execution
- Denial of Service
- Data Manipulation
- Security Restriction Bypass
- Spoofing
- Information Disclosure
System / Technologies affected
- Azure
- Developer Tools
- Windows
- Extended Security Updates (ESU)
- Microsoft Office
- Mariner
- Apps
- Microsoft Dynamics
- Browser
- Device
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor.
Vulnerability Identifier
Source
Related Link
Related Tags
Share with