Microsoft has released its February 2025 Patch Tuesday security updates, addressing a total of 55 vulnerabilities across various Windows products. Among these, 3 are classified as critical, and 4 are zero-day vulnerabilities, with 2 actively exploited in the wild.
Critical Vulnerabilities
CVE-2025-21376 – Windows LDAP Remote Code Execution (RCE)
Affected: Windows Lightweight Directory Access Protocol (LDAP)
Exploitation requires a race condition via a specially crafted request.
Could lead to arbitrary code execution in the Local Security Authority Subsystem Service (lsass.exe).
CVSS Score: 8.1 (More likely to be exploited).
CVE-2025-21379 – Windows DHCP Client RCE
Affected: Windows DHCP Client Service.
Exploitation could allow an attacker to execute arbitrary code via network packet manipulation.
CVSS Score: 7.1 (Less likely to be exploited).
CVE-2025-21177 – Microsoft Dynamics 365 SSRF Privilege Escalation
Allows an authorized attacker to elevate privileges over a network.
Impact: Can be used to gain unauthorized access to sensitive data.
Zero-Day Vulnerabilities (Actively Exploited)
CVE-2025-21418 – Windows Ancillary Function Driver for WinSock Elevation of Privilege
Impact: Allows local, authenticated attackers to gain SYSTEM-level privileges.
Status:Exploited in the wild.
CVE-2025-21391 – Windows Storage Privilege Escalation
Impact: Attackers can delete system files, potentially causing service disruptions.
Status:Exploited in the wild.
CVE-2025-21194 – Microsoft Surface Security Feature Bypass
Impact: Allows an attacker to bypass security protections, requiring network access and user interaction.
Status:Publicly disclosed before patch availability.