The All New Microsoft Patch Tuesday – January 2025

Patch Tuesday - January 2025

Microsoft is addressing 161 vulnerabilities this January 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation and/or public disclosure for eight of the vulnerabilities published today, with three listed on CISA KEV. This is now the fourth consecutive month where Microsoft has published zero-day vulnerabilities on Patch Tuesday without evaluating any of them as critical severity at time of publication. Today also sees the publication of nine critical remote code execution (RCE) vulnerabilities. Unusually, Microsoft has not yet published any browser vulnerabilities this month.

Access: triple zero-day RCE

Today sees the publication of three very similar zero-day Microsoft Access vulnerabilities: CVE-2025-21366CVE-2025-21395, and CVE-2025-21186. In each case, Microsoft notes public disclosure, but does not claim evidence of exploitation in the wild. Successful exploitation leads to code execution via heap-based buffer overflow, and requires that an attacker convince the user to download and open a malicious file.

Curiously, in each case, one portion of the advisory FAQ describes the update protection as “blocking potentially malicious extensions from being sent in an email”, but the remainder of the advisory doesn’t clarify how this would prevent malicious activity. Typically, patches provide protection by blocking malicious files upon receipt of a malicious email attachment, rather than preventing a malicious attachment from being sent in the first place, since an attacker is free to send whatever they like from any system they control.

The FAQ does mention that users who would otherwise have interacted with a malicious attachment will instead receive a notification that there was an attachment but “it cannot be accessed”, which is perhaps the best play on words we’ve seen from MSRC in a while.

Hyper-V NT Kernel Integration VSP: triple zero-day EoP

Microsoft is addressing a trio of related Windows Hyper-V NT Kernel Integration VSP elevation of privilege vulnerabilities today: CVE-2025-21333CVE-2025-21334, and CVE-2025-21335. Microsoft is aware of exploitation in the wild for all three, as seen on both the Microsoft advisories and CISA KEV. In each case, exploitation leads to SYSTEM privileges. The advisories are short on additional detail, beyond a brief acknowledgement of Anonymous — presumably an undisclosed party, rather than the hacktivist collective — on CVE-2025-21333.

While we can sometimes infer context from prior examples, in this case there aren’t any; there is no mention of Hyper-V NT Kernel Integration VSP in any vulnerability published by Microsoft, at least as far back as 2017. If we look back five years, CVE-2020-16885 does describe an elevation of privilege vulnerability in the Windows storage VSP driver, but there isn’t a lot to go on there either.

The Virtualization Service Provider (VSP) resides in the root partition of a Hyper-V instance, and provides synthetic device support to child partitions over the Virtual Machine Bus (VMBus): it’s the foundation of how Hyper-V allows the child partition to trick itself into thinking that it’s a real computer. Given that the entire thing is a security boundary, it’s perhaps surprising that no Hyper-V NT Kernel Integration VSP vulnerabilities have been acknowledged by Microsoft until today, but it won’t be at all shocking if more now emerge.

The advisories published today do not clarify whether the elevation of privilege is only to SYSTEM within the child partition, but container escape specialists will surely be hunting for exploits in this area.

Windows Themes: zero-day NTLM disclosure

Many enterprise users or even admins may not think about Windows Themes very often, but consider CVE-2025-21308: a spoofing vulnerability where successful exploitation leads to improper disclosure of an NTLM hash, which allows an attacker to impersonate the user from whom it was acquired. Microsoft does not have evidence of in-the-wild exploitation, but does note public disclosure.

The advisory FAQ dances around the exploitation methodology without explaining; what we learn is that once an attacker had somehow delivered a malicious file to the target system, a user would need to manipulate the malicious file, but not necessarily click or open it. Without further detail, we can only speculate, but it’s plausible that simply opening a folder containing the file in Windows Explorer — including the Downloads folder — or inserting a USB drive, would be enough to trigger the vulnerability and see your NTLM hash leak silently for collection by the threat actor.

Some good news: Microsoft has removed NTLMv1 support from Windows 11 24H2 and Server 2025 onwards. Less good: it has been a whole two months since Microsoft last patched a zero-day NTLM disclosure vulnerability; that flaw was within MSHTML/Trident, and Windows 11 24H2 and Server 2025 were still vulnerable, since NTLMv2 is still supported across the board.

On the advisory for CVE-2025-21308, Microsoft does link to documents describing a mitigation technique: restricting NTLM traffic. This is certainly worth a look, since a representative of reporting research organization 0patch has confirmed that NTLMv2 is affected by CVE-2025-21308.

Windows Installer: zero-day EoP

Installing or updating software often requires elevated privileges, and researchers and threat actors have known this for a long time. The advisory for CVE-2025-21275 doesn’t weigh us down with lengthy explanations, it simply says that successful exploitation leads to SYSTEM privileges. Microsoft is aware of public disclosure of this vulnerability, but not in-the-wild exploitation.

CVE-2025-21275 is the latest in a long line of Windows Installer elevation of privilege vulnerabilities; Microsoft has now published 37 Windows Installer elevation of privilege vulnerabilities in total since the start of 2020, although only five of those have been zero-days, with only CVE-2024-38014 known by Microsoft to have been exploited prior to publication in September 2024.

PGM: critical RCE

Microsoft’s in-house research teams are a reliable source of vulnerability discovery in Microsoft products, and today we get patches for the self-discovered CVE-2025-21307, a critical RCE in the Windows Reliable Multicast Transport Driver (RMCAST) with a CVSSv3 base score of 9.8. The vulnerability is only exploitable on a system where a program is listening on a Pragmatic General Multicast (PGM) port.

In 2025, you might very well expect that any service that a major commercial operating system exposes to the network would provide at least some form of authentication capability, but if so, prepare to be disappointed by the Windows implementation of PGM. The concept was first described in RFC 3208, which was published in 2001 in an Experimental state and stayed that way. As Microsoft themselves put it, “the PGM specification [RFC3208] is ambiguous in a number of areas”.

Given the lack of required user interaction and remote attack vector for CVE-2025-21307, it’s well worth asking yourself: does our firewall allow a PGM receiver to receive inbound traffic from the public internet? If so, the second-best time to prevent that is right now.

OLE: critical RCE

Outlook admins who force their users to read emails in plain text only can skip this paragraph, but everyone else should be aware of CVE-2025-21298, a Windows Object Linking and Embedding (OLE) critical RCE with a CVSSv3 base score of 9.8. The eternal threat of the malicious inbound email finds expression again here; just previewing the wrong email in Outlook is all it takes for an attacker to achieve code execution in the context of the user. All versions of Windows receive a patch.

Microsoft lifecycle update

In Microsoft product lifecycle news, Visual Studio 2022 17.6 LTSC receives its last update today.

Summary Charts

Patch Tuesday - January 2025
Patch Tuesday - January 2025
Patch Tuesday - January 2025
Windows Telephony Service looming large this month

Summary tables

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21380Azure Marketplace SaaS Resources Information Disclosure VulnerabilityNoNo8.8
CVE-2025-21403On-Premises Data Gateway Information Disclosure VulnerabilityNoNo6.4

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21178Visual Studio Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21176.NET, .NET Framework, and Visual Studio Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21172.NET and Visual Studio Remote Code Execution VulnerabilityNoNo7.5
CVE-2025-21171.NET Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-50338GitHub: CVE-2024-50338 Malformed URL allows information disclosure through git-credential-managerNoNo7.4
CVE-2025-21405Visual Studio Elevation of Privilege VulnerabilityNoNo7.3
CVE-2025-21173.NET Elevation of Privilege VulnerabilityNoNo7.3

ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21307Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution VulnerabilityNoNo9.8
CVE-2025-21298Windows OLE Remote Code Execution VulnerabilityNoNo9.8
CVE-2025-21411Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21413Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21233Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21236Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21237Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21243Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21244Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21252Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21266Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21282Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21302Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21303Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21306Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21273Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21286Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21305Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21339Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21246Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21417Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21250Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21240Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21238Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21223Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21409Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21245Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21293Active Directory Domain Services Elevation of Privilege VulnerabilityNoNo8.8
CVE-2025-21297Windows Remote Desktop Services Remote Code Execution VulnerabilityNoNo8.1
CVE-2025-21309Windows Remote Desktop Services Remote Code Execution VulnerabilityNoNo8.1
CVE-2025-21295SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution VulnerabilityNoNo8.1
CVE-2025-21294Microsoft Digest Authentication Remote Code Execution VulnerabilityNoNo8.1
CVE-2025-21287Windows Installer Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21378Windows CSC Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21281Microsoft COM for Windows Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21389Windows upnphost.dll Denial of Service VulnerabilityNoNo7.5
CVE-2025-21300Windows upnphost.dll Denial of Service VulnerabilityNoNo7.5
CVE-2025-21276Windows MapUrlToZone Denial of Service VulnerabilityNoNo7.5
CVE-2025-21218Windows Kerberos Denial of Service VulnerabilityNoNo7.5
CVE-2025-21220Microsoft Message Queuing Information Disclosure VulnerabilityNoNo7.5
CVE-2025-21251Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21270Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21277Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21285Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21289Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21290Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21230Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21231IP Helper Denial of Service VulnerabilityNoNo7.5
CVE-2025-21296BranchCache Remote Code Execution VulnerabilityNoNo7.5
CVE-2025-21331Windows Installer Elevation of Privilege VulnerabilityNoNo7.3
CVE-2025-21211Secure Boot Security Feature Bypass VulnerabilityNoNo6.8
CVE-2024-7344Cert CC: CVE-2024-7344 Howyar Taiwan Secure Boot BypassNoNo6.7
CVE-2025-21249Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21255Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21258Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21260Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21263Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21265Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21327Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21341Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21226Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21227Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21228Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21229Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21232Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21256Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21261Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21310Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21324Windows Digital Media Elevation of Privilege VulnerabilityNoNo6.6
CVE-2025-21308Windows Themes Spoofing VulnerabilityNoYes6.5
CVE-2025-21217Windows NTLM Spoofing VulnerabilityNoNo6.5
CVE-2025-21272Windows COM Server Information Disclosure VulnerabilityNoNo6.5
CVE-2025-21288Windows COM Server Information Disclosure VulnerabilityNoNo6.5
CVE-2025-21278Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityNoNo6.2
CVE-2025-21242Windows Kerberos Information Disclosure VulnerabilityNoNo5.9
CVE-2025-21336Windows Cryptographic Information Disclosure VulnerabilityNoNo5.6
CVE-2025-21316Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21318Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21319Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21320Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21321Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21274Windows Event Tracing Denial of Service VulnerabilityNoNo5.5
CVE-2025-21374Windows CSC Service Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21215Secure Boot Security Feature Bypass VulnerabilityNoNo4.6
CVE-2025-21213Secure Boot Security Feature Bypass VulnerabilityNoNo4.6
CVE-2025-21269Windows HTML Platforms Security Feature Bypass VulnerabilityNoNo4.3
CVE-2025-21268MapUrlToZone Security Feature Bypass VulnerabilityNoNo4.3
CVE-2025-21329MapUrlToZone Security Feature Bypass VulnerabilityNoNo4.3
CVE-2025-21328MapUrlToZone Security Feature Bypass VulnerabilityNoNo4.3
CVE-2025-21189MapUrlToZone Security Feature Bypass VulnerabilityNoNo4.3
CVE-2025-21332MapUrlToZone Security Feature Bypass VulnerabilityNoNo4.3
CVE-2025-21210Windows BitLocker Information Disclosure VulnerabilityNoNo4.2
CVE-2025-21214Windows BitLocker Information Disclosure VulnerabilityNoNo4.2
CVE-2025-21312Windows Smart Card Reader Information Disclosure VulnerabilityNoNo2.4

ESU Windows Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21338GDI+ Remote Code Execution VulnerabilityNoNo7.8

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21187Microsoft Power Automate Remote Code Execution VulnerabilityNoNo7.8

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21385Microsoft Purview Information Disclosure VulnerabilityNoNo8.8
CVE-2025-21363Microsoft Word Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21344Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21361Microsoft Outlook Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21345Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21356Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21365Microsoft Office Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21402Microsoft Office OneNote Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21364Microsoft Excel Security Feature Bypass VulnerabilityNoNo7.8
CVE-2025-21354Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21362Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21360Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21366Microsoft Access Remote Code Execution VulnerabilityNoYes7.8
CVE-2025-21395Microsoft Access Remote Code Execution VulnerabilityNoYes7.8
CVE-2025-21186Microsoft Access Remote Code Execution VulnerabilityNoYes7.8
CVE-2025-21348Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo7.2
CVE-2025-21346Microsoft Office Security Feature Bypass VulnerabilityNoNo7.1
CVE-2025-21357Microsoft Outlook Remote Code Execution VulnerabilityNoNo6.7
CVE-2025-21393Microsoft SharePoint Server Spoofing VulnerabilityNoNo6.3

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-21311Windows NTLM V1 Elevation of Privilege VulnerabilityNoNo9.8
CVE-2025-21239Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21241Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21248Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21292Windows Search Service Elevation of Privilege VulnerabilityNoNo8.8
CVE-2025-21291Windows Direct Show Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-21224Windows Line Printer Daemon (LPD) Service Remote Code Execution VulnerabilityNoNo8.1
CVE-2025-21370Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21234Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21235Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21335Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-21333Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-21334Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-21382Windows Graphics Component Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21271Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21275Windows App Package Installer Elevation of Privilege VulnerabilityNoYes7.8
CVE-2025-21304Microsoft DWM Core Library Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21315Microsoft Brokering File System Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21372Microsoft Brokering File System Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-21326Internet Explorer Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-21343Windows Web Threat Defense User Service Information Disclosure VulnerabilityNoNo7.5
CVE-2025-21330Windows Remote Desktop Services Denial of Service VulnerabilityNoNo7.5
CVE-2025-21207Windows Connected Devices Platform Service (Cdpsvc) Denial of Service VulnerabilityNoNo7.5
CVE-2025-21299Windows Kerberos Security Feature Bypass VulnerabilityNoNo7.1
CVE-2025-21314Windows SmartScreen Spoofing VulnerabilityNoNo6.5
CVE-2025-21313Windows Security Account Manager (SAM) Denial of Service VulnerabilityNoNo6.5
CVE-2025-21301Windows Geolocation Service Information Disclosure VulnerabilityNoNo6.5
CVE-2025-21193Active Directory Federation Server Spoofing VulnerabilityNoNo6.5
CVE-2025-21202Windows Recovery Environment Agent Elevation of Privilege VulnerabilityNoNo6.1
CVE-2025-21225Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityNoNo5.9
CVE-2025-21257Windows WLAN AutoConfig Service Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21340Windows Virtualization-Based Security (VBS) Security Feature Bypass VulnerabilityNoNo5.5
CVE-2025-21280Windows Virtual Trusted Platform Module Denial of Service VulnerabilityNoNo5.5
CVE-2025-21284Windows Virtual Trusted Platform Module Denial of Service VulnerabilityNoNo5.5
CVE-2025-21317Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21323Windows Kernel Memory Information Disclosure VulnerabilityNoNo5.5
CVE-2025-21219MapUrlToZone Security Feature Bypass VulnerabilityNoNo4.3

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now

Leave a Reply

Your email address will not be published. Required fields are marked *