Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

What to know about the dating app Tea and its hacked data

July 26, 2025

If you don’t have diabetes, do you really need a continuous glucose monitor?

July 26, 2025

Blue Ivy shines on stage during Beyoncé’s Cowboy Carter tour

July 26, 2025
Facebook X (Twitter) Instagram
Trending
  • What to know about the dating app Tea and its hacked data
  • If you don’t have diabetes, do you really need a continuous glucose monitor?
  • Blue Ivy shines on stage during Beyoncé’s Cowboy Carter tour
  • Judge pauses cancellation of humanities grants
  • African Americans move to Kenya to connect with heritage and culture
  • ‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires
  • How Jeffrey Epstein Got So Rich
  • Despite rainy weather, Catholics in a Paraguayan town dress as birds to honor their patron saint
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Sunday, July 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
Cybersecurity

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

adminBy adminMay 13, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 42


Microsoft on Tuesday released security patches covering at least 70 vulnerabilities across the Windows OS and software stack and called urgent attention to five zero-days marked in the “exploitation detected” category.

As part of the scheduled batch of Patch Tuesday updates, Redmond’s security response team warned that malicious hackers are already exploiting bugs in the Microsoft Scripting Engine and the oft-targeted Windows Common Log File System (CLFS) Driver.

The five zero-days marked for immediate attention:

CVE-2025-30397 — Scripting Engine Memory Corruption Vulnerability (remote code execution). Access of resource using incompatible type (‘type confusion’) in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. This attack requires an authenticated client to click a link so that an unauthenticated attacker can initiate remote code execution.

CVE-2025-32709 — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.  This is a use-after-free memory corruption bug that allows an authorized attacker to elevate privileges locally. An attacker who successfully exploited this vulnerability could gain administrator privileges.

CVE-2025-32706 — Windows Common Log File System Driver Elevation of Privilege Vulnerability. Microsoft describes this as an improper input validation flaw in Windows Common Log File System Driver that allows an authorized attacker to elevate privileges locally.

CVE-2025-32701 — Windows Common Log File System Driver Elevation of Privilege Vulnerability.  This is a use-after-free memory corruption bug that allows an authorized attacker to elevate privileges locally.

CVE-2025-30400 –Microsoft DWM Core Library Elevation of Privilege Vulnerability.  Described as a use-after-free in Windows DWM that allows an authorized attacker to elevate privileges locally. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

The company did not publish indicators of compromise (IOCs) or telemetry data to help defenders hunt for infections. Information on the targeting and victims of the zero-days remain a mystery.

Microsoft has struggled to keep pace with attackers exploiting bugs in the CLFS and has been experimenting with a major new security mitigation to thwart a surge in cyberattacks from APT and ransomware threat actors.

The company has been adding Hash-based Message Authentication Codes (HMAC) to detect unauthorized modifications to CLFS log files and cover one of the most attractive Windows OS attack surfaces.

In all, Microsoft documented at least 70 security vulnerabilities across the Windows OS and software components, with six bulletins marked as “critical.”

The critical-severity bugs, which all carry remote code execution risk, affect the Windows Remote Desktop Services (an unauthorized attacker to execute code over a network); Microsoft Office (use-after-free allows an unauthorized attacker to execute code locally); and the Microsoft Virtual Machine Bus VMBUS race condition that  allows an authorized attacker to execute code over a network.

Related: Microsoft Intros HMAC-Based Mitigation for Windows Logfile Flaws

Advertisement. Scroll to continue reading.

Related: Microsoft Patches Windows Zero-Day Exploited by Russian Hackers

Related: Microsoft Raises Alert for Under-Attack Windows Flaw

Related: Anatomy of a BlackCat Attack Through the Eyes of Incident Response

Related: Windows Zero-Day Exploited in Nokoyawa Ransomware Attacks



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires

July 25, 2025

After signing a new $1.5 billion deal with Paramount, Trey Parker and Matt Stone are…

How Jeffrey Epstein Got So Rich

July 25, 2025

Vanta Raises Funds At $4 Billion Valuation—Despite Not Needing Cash

July 23, 2025

Former Citigroup Chair Sandy Weill’s New $100 Million Gift To Harness AI For A West Coast Cancer Hub

July 23, 2025
Our Picks

What to know about the dating app Tea and its hacked data

July 26, 2025

If you don’t have diabetes, do you really need a continuous glucose monitor?

July 26, 2025

Blue Ivy shines on stage during Beyoncé’s Cowboy Carter tour

July 26, 2025

Judge pauses cancellation of humanities grants

July 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.