Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr
Reports indicated that the elevation of privilege vulnerability (CVE-2025-29824) in Windows Common Log File System Driver is being exploited in the wild. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022, 2022, 23H2 Edition, 2025
- Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, LTSC for Mac 2021, LTSC for Mac 2024, for Android, for Universal
- Office Online Server
- Microsoft Excel 2016
- Microsoft Word 2016
- Microsoft OneNote 2016
- Microsoft OneNote for Mac
- Microsoft Outlook for Android
- Microsoft 365 Apps for Enterprise
- Microsoft Access 2016
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Visual Studio 2022
- ASP.NET Core 8.0, 9.0
- Microsoft AutoUpdate for Mac
- Remote Desktop client for Windows Desktop
- SQL Server Management Studio 20.2
- System Center Data Protection Manager 2019, 2022, 2025, Operations Manager 2019, 2022, 2025, Orchestrator 2019, 2022, 2025, Service Manager 2019, 2022, 2025, Virtual Machine Manager 2019, 2022, 2025
- Visual Studio Tools for Applications (VSTA) 2019, 2022
- Visual Studio Code
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, denial of service, security restriction bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-april-2025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20570
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21174
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21203 (to CVE-2025-21205)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21221 (to CVE-2025-21222)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24073 (to CVE-2025-24074)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25002
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26628
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26635
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26637
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26639 (to CVE-2025-26642)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26644
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26647 (to CVE-2025-26649)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26651 (to CVE-2025-26652)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26663 (to CVE-2025-26676)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26678 (to CVE-2025-26682)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26686 (to CVE-2025-26688)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27469 (to CVE-2025-27487)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27489 (to CVE-2025-27492)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27727 (to CVE-2025-27733)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27735 (to CVE-2025-27752)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29791 (to CVE-2025-29794)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29800 (to CVE-2025-29805)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29808 (to CVE-2025-29812)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29819 (to CVE-2025-29824)