Skip to main content

March 2025 Security Updates
This release consists of the following 57 Microsoft CVEs:

Tag CVE Base Score CVSS Vector Exploitability FAQs? Workarounds? Mitigations?

Windows exFAT File System CVE-2025-21180
Azure Agent Installer CVE-2025-21199
Windows MapUrlToZone CVE-2025-21247
Windows Remote Desktop Services CVE-2025-24035
.NET CVE-2025-24043
Windows Win32 Kernel Subsystem CVE-2025-24044
Windows Remote Desktop Services CVE-2025-24045
Microsoft Streaming Service CVE-2025-24046
Role: Windows Hyper-V CVE-2025-24048
Azure CLI CVE-2025-24049
Role: Windows Hyper-V CVE-2025-24050
Windows Routing and Remote Access Service (RRAS) CVE-2025-24051
Windows NTLM CVE-2025-24054
Windows USB Video Driver CVE-2025-24055
Windows Telephony Server CVE-2025-24056
Microsoft Office CVE-2025-24057
Windows Common Log File System Driver CVE-2025-24059
Windows Mark of the Web (MOTW) CVE-2025-24061
Role: DNS Server CVE-2025-24064
Windows Kernel-Mode Drivers CVE-2025-24066
Microsoft Streaming Service CVE-2025-24067
ASP.NET Core & Visual Studio CVE-2025-24070
Windows File Explorer CVE-2025-24071
Microsoft Local Security Authority Server (lsasrv) CVE-2025-24072
Microsoft Office Excel CVE-2025-24075
Windows Cross Device Service CVE-2025-24076
Microsoft Office Word CVE-2025-24077
Microsoft Office Word CVE-2025-24078
Microsoft Office Word CVE-2025-24079
Microsoft Office CVE-2025-24080
Microsoft Office Excel CVE-2025-24081
Microsoft Office Excel CVE-2025-24082
Microsoft Office CVE-2025-24083
Windows Subsystem for Linux CVE-2025-24084
Windows Win32 Kernel Subsystem CVE-2025-24983
Windows NTFS CVE-2025-24984
Windows Fast FAT Driver CVE-2025-24985
Azure PromptFlow CVE-2025-24986
Windows USB Video Driver CVE-2025-24987
Windows USB Video Driver CVE-2025-24988
Windows NTFS CVE-2025-24991
Windows NTFS CVE-2025-24992
Windows NTFS CVE-2025-24993
Windows Cross Device Service CVE-2025-24994
Kernel Streaming WOW Thunk Service Driver CVE-2025-24995
Windows NTLM CVE-2025-24996
Windows Kernel Memory CVE-2025-24997
Visual Studio CVE-2025-24998
Visual Studio CVE-2025-25003
Microsoft Windows CVE-2025-25008
Azure Arc CVE-2025-26627
Microsoft Office CVE-2025-26629
Microsoft Office Access CVE-2025-26630
Visual Studio Code CVE-2025-26631
Microsoft Management Console CVE-2025-26633
Microsoft Edge (Chromium-based) CVE-2025-26643
Remote Desktop Client CVE-2025-26645

We are republishing 10 non-Microsoft CVEs:
CNA Tag CVE FAQs? Workarounds? Mitigations?
Synaptics, Inc. Microsoft Windows CVE-2024-9157 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1914 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1915 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1916 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1917 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1918 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1919 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1921 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1922 Yes No No
Chrome Microsoft Edge (Chromium-based) CVE-2025-1923 Yes No No

Security Update Guide Blog Posts
Date Blog Post
November 12, 2024 Toward greater transparency: Publishing machine-readable CSAF files
June 27, 2024 Toward greater transparency: Unveiling Cloud Service CVEs
April 9, 2024 Toward greater transparency: Security Update Guide now shares CWEs for CVEs
January 6, 2023 Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API
January 11, 2022 Coming Soon: New Security Update Guide Notification System
February 9, 2021 Continuing to Listen: Good News about the Security Update Guide API
January 13, 2021 Security Update Guide Supports CVEs Assigned by Industry Partners
December 8, 2020 Security Update Guide: Let’s keep the conversation going
November 9, 2020 Vulnerability Descriptions in the New Version of the Security Update Guide

Relevant Resources

  • The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
  • Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10 and Windows 11, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 and Windows 11 operating systems, please see Windows Lifecycle Facts Sheet.
  • Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
  • A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
  • In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
  • Customers running Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.

Known Issues
You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.

For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).

KB Article Applies To
5053596 Windows 10, version 1809, Windows Server 2019
5053598 Windows 11, version 24H2
5053599 Windows Server 2022, 23H2 Edition (Server Core installation)
5053602 Windows 11, version 22H2, Windows 11, version 23H2
5053606 Windows 10, version 21H2, Windows 10, version 22H2
5053888 Windows Server 2008 (Monthly Rollup)
5053995 Windows Server 2008 (Security-only update)

Released: Mar 11, 2025
March 2025 Security Updates - Release Notes - Security Update Guide - Microsoft

CVEs have been published or revised in the Security Update Guide

March 12, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-1920

  • Title: Chromium: CVE-2025-1920 Type Confusion in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 12, 2025
  • Last updated: March 12, 2025
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2025-2135

  • Title: Chromium: CVE-2025-2135 Type Confusion in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 12, 2025
  • Last updated: March 12, 2025
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2025-2136

  • Title: Chromium: CVE-2025-2136 Use after free in Inspector
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 12, 2025
  • Last updated: March 12, 2025
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2025-2137

  • Title: Chromium: CVE-2025-2137 Out of bounds read in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 12, 2025
  • Last updated: March 12, 2025
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2025-24201

  • Title: Chromium: CVE-2025-24201 Out of bounds write in GPU on Mac
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 12, 2025
  • Last updated: March 12, 2025
  • Aggregate CVE severity rating:
  • Customer action required: Yes
 

CVEs have been published or revised in the Security Update Guide

March 12, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2024-30098

  • Title: Windows Cryptographic Services Security Feature Bypass Vulnerability
  • Version: 2.0
  • Reason for revision: The following updates have been made to CVE-2024-30098: 1. In the Security Updates table, added all supported versions of the following as they are affected by this vulnerability: Windows 11 24H2 and Windows Server 2025. 2. To comprehensively address this vulnerability, Microsoft has released March 2025 security updates for all affected versions of Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, and Windows Server 2022 23H2 Edition, Windows 10, and Windows 11. 3. Updated the "Are there any further actions I need to take to be protected from this vulnerability?" FAQ to state that Starting with the April 2025, the fix will automatically generate an audit event in cases where the Cryptographic Service Provider (CSP) is being used with RSA keys. If you have not already enabled the fix using the DisableCapiOverrideForRSA setting, you should monitor your systems for any error events in the Windows system event log. See the FAQ section of this CVE for more information.
  • Originally released: July 9, 2024
  • Last updated: March 11, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2024-49116

  • Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
  • Version: 2.0
  • Reason for revision: To comprehensively address CVE-2024-49116, Microsoft has released March 2025 security updates for all supported editions of Windows Server 2016 and Windows Server 2019. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
  • Originally released: December 10, 2024
  • Last updated: March 11, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: Yes

CVE-2025-24036

  • Title: Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
  • Version: 2.1
  • Reason for revision: Added an FAQ. This is an information change only.
  • Originally released: February 11, 2025
  • Last updated: March 11, 2025
  • Aggregate CVE severity rating: Important

Customer action required: Yes


Reply