Last updated at Sat, 22 Feb 2025 17:05:47 GMT

Microsoft is addressing 56 vulnerabilities this February 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for two of the vulnerabilities published today, which is reflected in CISA KEV. Microsoft is aware of public disclosure for two other vulnerabilities. This is now the fifth consecutive month where Microsoft has published zero-day vulnerabilities on Patch Tuesday without evaluating any of them as critical severity at time of publication. Today also sees the publication of just three critical remote code execution (RCE) vulnerabilities. Eleven browser vulnerabilities have already been published separately this month, and are not included in the total.

Ancillary Function Driver: zero-day EoP

All versions of Windows receive patches today for CVE-2025-21418, a heap-based buffer overflow in the Windows Ancillary Function Driver (AFD). Successful exploitation leads to SYSTEM privileges. The AFD has been around for decades; it handles foundational networking functionality, so it is necessarily a kernel driver which interacts with a great deal of user-supplied input. It is perhaps not very shocking that AFD has been the site of a significant number of problems over the years: specifically, elevation of privilege (EoP) vulnerabilities. Microsoft is aware of existing exploitation in the wild, and with low attack complexity, low privilege requirements, and no requirement for user interaction, CVE-2025-21418 is one to prioritize for patching. The relatively low CVSSv3 base score of 7.8 and severity rating of Important may appear relatively mild; however, broad similarities exist between this vuln and CVE-2024-38193, which Rapid7 flagged as ripe for malware abuse on the day it was published, and which has subsequently been linked to exploitation by North Korean state-associated threat actor tracked as Lazarus.

Windows Storage: zero-day EoP

Ever wanted to delete a file on a Windows box, but pesky permissions prevented you from achieving your goal? CVE-2025-21391 might be just what you need: an elevation of privilege (EoP) vulnerability in the Windows Storage service for which Microsoft is aware of exploitation in the wild. No user interaction is required, and attack complexity is low, and the weakness is given as “CWE-59: Improper Link Resolution Before File Access” but what are attackers hoping to achieve here? Although the advisory provides scant detail, and even offers some vague reassurance that “an attacker would only be able to delete targeted files on a system”, it would be a mistake to assume that the impact of deleting arbitrary files would be limited to data loss or denial of service. As long ago as 2022, ZDI researchers set out how a motivated attacker could parlay arbitrary file deletion into full SYSTEM access using techniques which also involve creative misuse of symbolic links.

NTLMv2 disclosure: zero-day spoofing

It’s almost surprising when any particular Patch Tuesday doesn’t involve plugging one or two holes through which NTLM hashes can leak. CVE-2025-21377 describes an NTLMv2 hash disclosure vulnerability where exploitation ultimately results in the attacker gaining the ability to authenticate as the targeted user. Minimal user interaction with a malicious file is required, including selecting, inspecting, or “performing an action other than opening or executing the file.” This trademark linguistic ducking and weaving may be Microsoft’s way of saying “if we told you any more, we’d give the game away.” Accordingly, Microsoft assesses exploitation as more likely. The advisory acknowledges researchers from 0patch by ACROS Security — who also reported last month’s NTLM hash disclosure zero-day vuln CVE-2025-21308 — as well as others from Securify and Cathay Pacific; this might be the first instance of an airline receiving credit for reporting a Microsoft zero-day vulnerability.

Surface: zero-day container escape

A wide array of Microsoft Surface machines are vulnerable to CVE-2025-21194 until patched, although the most recent Surface Pro 10 and 11 series are not listed as vulnerable. The vulnerability is described as a security feature bypass, and exploitation could lead to container escape from a UEFI host machine and compromise of the hypervisor. Surface devices receive updates via Windows Update, although the advisory also gives brief instructions for users who wish to apply the updates manually. Microsoft describes the vulnerability as publicly disclosed.

LDAP server: critical RCE

Any security advisory which lists multiple weakness types typically describes a complex vulnerability, and Windows LDAP critical remote code execution (RCE) CVE-2025-21376 is no exception. Successful exploitation requires an attacker to navigate multiple challenges, including winning a race condition. The prize: code execution on the Windows LDAP server. Although Microsoft seldom specifies the privilege level of code execution on LDAP server vulnerabilities, Rapid7 has noted previously that the LDAP service runs in a SYSTEM context, and that is the only safe assumption. All versions of Windows receive a patch.

DHCP client: critical RCE

Today sees the publication of a slightly mysterious critical RCE in the Windows DHCP Client Service. Exploitation of CVE-2025-21379 requires an attacker to intercept and potentially modify communications between the Windows DHCP client and the requested resource, which implies either that an attacker can break encryption, or that no encryption is present in the DHCP communication; this risk is highlighted in Microsoft’s own spec for DHCP implementation.

Excel: critical RCE

As if spreadsheets weren’t dangerous enough by themselves, today sees publication of CVE-2025-21381, a critical RCE in Excel. As usual for this class of attack, the advisory clarifies that “remote” in this case refers to the location of the attacker, since user interaction is required, and the code execution will be in the context of the user on their local machine. The Preview Pane is an attack vector, so simply glancing at a file or email containing a specially crafted malicious spreadsheet is enough for the attack to succeed, although an attacker could also convince a user to download and open a file from a website, or perhaps simply scatter a few USB sticks in the parking lot.

Microsoft lifecycle update

In Microsoft product lifecycle news, SQL Server 2019 moves from mainstream support to extended support on 2025-02-28.

Summary charts

A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday February 2025.

A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday February 2025.

A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday February 2025.

Summary tables

Apps vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21322 Microsoft PC Manager Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21259 Microsoft Outlook Spoofing Vulnerability No No 5.3

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21198 Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability No No 9
CVE-2025-21188 Azure Network Watcher VM Extension Elevation of Privilege Vulnerability No No 6

Browser vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21342 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability No No 8.8
CVE-2025-21408 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability No No 8.8
CVE-2025-21279 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability No No 6.5
CVE-2025-21283 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability No No 6.5
CVE-2025-21253 Microsoft Edge for IOS and Android Spoofing Vulnerability No No 5.3
CVE-2025-21267 Microsoft Edge (Chromium-based) Spoofing Vulnerability No No 4.4
CVE-2025-21404 Microsoft Edge (Chromium-based) Spoofing Vulnerability No No 4.3
CVE-2025-0451 Chromium: CVE-2025-0451 Inappropriate implementation in Extensions API No No N/A
CVE-2025-0445 Chromium: CVE-2025-0445 Use after free in V8 No No N/A
CVE-2025-0444 Chromium: CVE-2025-0444 Use after free in Skia No No N/A

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21206 Visual Studio Installer Elevation of Privilege Vulnerability No No 7.3
CVE-2025-24042 Visual Studio Code JS Debug Extension Elevation of Privilege Vulnerability No No 7.3
CVE-2025-24039 Visual Studio Code Elevation of Privilege Vulnerability No No 7.3

Developer Tools Mariner vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2023-32002 HackerOne: CVE-2023-32002 Node.js Module._load() policy Remote Code Execution Vulnerability No No N/A

Device vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21194 Microsoft Surface Security Feature Bypass Vulnerability No Yes 7.1

ESU Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21406 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21407 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21190 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21200 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21371 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21201 Windows Telephony Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-21208 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 8.8
CVE-2025-21410 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 8.8
CVE-2025-21368 Microsoft Digest Authentication Remote Code Execution Vulnerability No No 8.8
CVE-2025-21369 Microsoft Digest Authentication Remote Code Execution Vulnerability No No 8.8
CVE-2025-21376 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability No No 8.1
CVE-2025-21359 Windows Kernel Security Feature Bypass Vulnerability No No 7.8
CVE-2025-21373 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21420 Windows Disk Cleanup Tool Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21418 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-21375 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21181 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21419 Windows Setup Files Cleanup Elevation of Privilege Vulnerability No No 7.1
CVE-2025-21377 NTLM Hash Disclosure Spoofing Vulnerability No Yes 6.5
CVE-2025-21352 Internet Connection Sharing (ICS) Denial of Service Vulnerability No No 6.5
CVE-2025-21347 Windows Deployment Services Denial of Service Vulnerability No No 6
CVE-2025-21350 Windows Kerberos Denial of Service Vulnerability No No 5.9
CVE-2025-21337 Windows NTFS Elevation of Privilege Vulnerability No No 3.3

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21177 Microsoft Dynamics 365 Sales Elevation of Privilege Vulnerability No No 8.7

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21400 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8
CVE-2025-21392 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-21397 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-21381 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21386 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21387 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21390 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21394 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21383 Microsoft Excel Information Disclosure Vulnerability No No 7.8
CVE-2025-24036 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability No No 7

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21367 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21358 Windows Core Messaging Elevation of Privileges Vulnerability No No 7.8
CVE-2025-21351 Windows Active Directory Domain Services API Denial of Service Vulnerability No No 7.5
CVE-2025-21182 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability No No 7.4
CVE-2025-21183 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability No No 7.4
CVE-2025-21391 Windows Storage Elevation of Privilege Vulnerability Yes No 7.1
CVE-2025-21379 DHCP Client Service Remote Code Execution Vulnerability No No 7.1
CVE-2025-21184 Windows Core Messaging Elevation of Privileges Vulnerability No No 7
CVE-2025-21414 Windows Core Messaging Elevation of Privileges Vulnerability No No 7
CVE-2025-21349 Windows Remote Desktop Configuration Service Tampering Vulnerability No No 6.8
CVE-2025-21212 Internet Connection Sharing (ICS) Denial of Service Vulnerability No No 6.5
CVE-2025-21216 Internet Connection Sharing (ICS) Denial of Service Vulnerability No No 6.5
CVE-2025-21254 Internet Connection Sharing (ICS) Denial of Service Vulnerability No No 6.5
CVE-2025-21179 DHCP Client Service Denial of Service Vulnerability No No 4.8

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.