Actively Exploited Vulnerabilities

 Actively Exploited Vulnerabilities

CVE-2025-24983 

Windows Win32 Kernel Subsystem Elevation of Privilege

  • CVSS: 7.0 

  • Exploitation: Attackers exploited a race condition to escalate privileges to SYSTEM-level access.

  • Context: Part of a broader campaign targeting kernel-level vulnerabilities for lateral movement in enterprise networks

  • Mitigation: Patched in March 2025 Patch Tuesday.

CVE-2025-26633

Microsoft Management Console Security Feature Bypass

  • CVSS: 7.0

  • Exploitation: Used by the EncryptHub ransomware group (Larva-208) to bypass security mechanisms. Attackers delivered malicious files via email attachments or links through instant messaging.

  • Impact: Enabled execution of arbitrary code without triggering standard security warnings.

CVE-2025-24985 & CVE-2025-24993

Windows Fast FAT/NTFS Remote Code Execution

  • CVSS: 7.8 (NTFS), 7.8 (Fast FAT)

  • Exploitation: Both were part of six zero-days actively exploited in ransomware campaigns. Attackers leveraged these flaws to overwrite system files or execute malicious payloads24.

Publicly Disclosed Vulnerabilities

CVE-2025-26630

Microsoft Access Remote Code Execution

  • CVSS: Not rated (publicly disclosed but not exploited).

  • Discovery: Found by Unpatched.ai as a use-after-free bug.

  • Attack Vector: Requires social engineering to trick users into opening malicious Access files1.

Critical Vulnerabilities with Exploit Potential

CVE-2025-24035 & CVE-2025-24045

Windows Remote Desktop Services (RDS) RCE

  • CVSS: 8.1 (both)

  • Technical Details

    • CVE-2025-24035: Caused by improper memory locking in RDS, allowing unauthorized network-based code execution.

    • CVE-2025-24045: Required attackers to win a race condition for exploitation.

  • Risk: Widely targeted due to RDS’s prevalence in enterprise environments.

CVE-2025-26645

Remote Desktop Client RCE

  • CVSS: 8.8

  • Mechanism: Exploited via relative path traversal when connecting to a malicious RDP server.

  • Impact: Enabled full system compromise without user interaction beyond initiating an RDP connection.

CVE-2025-24057

Microsoft Office RCE

  • CVSS: 7.8

  • Exploit Method: Heap-based buffer overflow triggered via malicious Office documents.

  • User Interaction: Required previewing a file in the Preview Pane, raising questions about attack practicality.

CVE-2025-24064

Windows DNS Server RCE

  • CVSS: 8.1

  • Technical Flaw: Use-after-free vulnerability in DNS Server handling crafted requests.

  • Urgency: Critical for organizations running on-premises DNS servers36.

CVE-2025-24084

Windows Subsystem for Linux (WSL2) Kernel RCE

  • CVSS: 8.4

  • Attack Vector: Required execution of a malicious binary within the WSL2 environment.

  • Scope: Highlighted risks in mixed Windows/Linux development setups.

Key Observations

  • Zero-Day Volume: Six vulnerabilities were actively exploited before patches arrived, reflecting heightened attacker sophistication.

  • Ransomware Focus: Exploited flaws in NTFS/FAT and Win32 Kernel were tied to ransomware campaigns.

  • Patch Urgency: Over 50% of March’s vulnerabilities were RCE or privilege escalation flaws, emphasizing the need for rapid deployment.

For organizations, prioritizing patches for CVE-2025-26645 (RDP Client), CVE-2025-24064 (DNS), and kernel-level flaws like CVE-2025-24983 is critical to mitigating large-scale breaches.




0 Comments