Microsoft Tackles USB Spy, 7 Zero Days on Patch Tuesday

Microsoft released the March security updates of Patch Tuesday 2025, eliminating 57 vulnerabilities, including 6 actively operated zero days. Among the corrected problems are 6 critical vulnerabilities that allow you to execute remote code.

In March, the company closed:

  • 23 of the vulnerabilities of raising privileges (Elevation of Privilege, Eop);
  • 3 vulnerabilities of security bypass (Security Feature bypass);
  • 23 (Remote Code Execution, RCE);
  • 4 Information disclosure vulnerabilities (Information Disclosure);
  • 1 vulnerability of the type of “refusal” (Denial of service “);
  • 3 Spoofing (spoofing).

The list did not include vulnerabilities in Mariner and 10 previously fixed Microsoft Edge vulnerability.

To learn more about the updates that are not related to security today, you should get acquainted with the accumulative updates of Windows 11 kb5053598 and kb5053602 , as well as with Windows 10 KB5053606 .

Six actively operated vulnerabilities

Microsoft eliminated 6 vulnerabilities actively used in attacks, as well as 1 publicly disclosed problem, bringing the total number of zero days to 7. In particular, several operated errors are associated with NTFS processing and mounting VHDs.

  • cve-2025-24983 – vulnerability in the nucleus of the Windows Win32 core, leading to an increase in privileges. The error allows local attackers to get System privileges on the device after winning the Race Condition race. Microsoft has not yet disclosed the details of operation

/Reports, release notes, official announcements.