Last updated at Fri, 17 Jan 2025 21:50:09 GMT

Microsoft is addressing 161 vulnerabilities this January 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation and/or public disclosure for eight of the vulnerabilities published today, with three listed on CISA KEV. This is now the fourth consecutive month where Microsoft has published zero-day vulnerabilities on Patch Tuesday without evaluating any of them as critical severity at time of publication. Today also sees the publication of nine critical remote code execution (RCE) vulnerabilities. Unusually, Microsoft has not yet published any browser vulnerabilities this month.

Access: triple zero-day RCE

Today sees the publication of three very similar zero-day Microsoft Access vulnerabilities: CVE-2025-21366, CVE-2025-21395, and CVE-2025-21186. In each case, Microsoft notes public disclosure, but does not claim evidence of exploitation in the wild. Successful exploitation leads to code execution via heap-based buffer overflow, and requires that an attacker convince the user to download and open a malicious file.

Curiously, in each case, one portion of the advisory FAQ describes the update protection as “blocking potentially malicious extensions from being sent in an email”, but the remainder of the advisory doesn’t clarify how this would prevent malicious activity. Typically, patches provide protection by blocking malicious files upon receipt of a malicious email attachment, rather than preventing a malicious attachment from being sent in the first place, since an attacker is free to send whatever they like from any system they control.

The FAQ does mention that users who would otherwise have interacted with a malicious attachment will instead receive a notification that there was an attachment but “it cannot be accessed”, which is perhaps the best play on words we’ve seen from MSRC in a while.

Hyper-V NT Kernel Integration VSP: triple zero-day EoP

Microsoft is addressing a trio of related Windows Hyper-V NT Kernel Integration VSP elevation of privilege vulnerabilities today: CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335. Microsoft is aware of exploitation in the wild for all three, as seen on both the Microsoft advisories and CISA KEV. In each case, exploitation leads to SYSTEM privileges. The advisories are short on additional detail, beyond a brief acknowledgement of Anonymous — presumably an undisclosed party, rather than the hacktivist collective — on CVE-2025-21333.

While we can sometimes infer context from prior examples, in this case there aren’t any; there is no mention of Hyper-V NT Kernel Integration VSP in any vulnerability published by Microsoft, at least as far back as 2017. If we look back five years, CVE-2020-16885 does describe an elevation of privilege vulnerability in the Windows storage VSP driver, but there isn’t a lot to go on there either.

The Virtualization Service Provider (VSP) resides in the root partition of a Hyper-V instance, and provides synthetic device support to child partitions over the Virtual Machine Bus (VMBus): it’s the foundation of how Hyper-V allows the child partition to trick itself into thinking that it’s a real computer. Given that the entire thing is a security boundary, it’s perhaps surprising that no Hyper-V NT Kernel Integration VSP vulnerabilities have been acknowledged by Microsoft until today, but it won’t be at all shocking if more now emerge.

The advisories published today do not clarify whether the elevation of privilege is only to SYSTEM within the child partition, but container escape specialists will surely be hunting for exploits in this area.

Windows Themes: zero-day NTLM disclosure

Many enterprise users or even admins may not think about Windows Themes very often, but consider CVE-2025-21308: a spoofing vulnerability where successful exploitation leads to improper disclosure of an NTLM hash, which allows an attacker to impersonate the user from whom it was acquired. Microsoft does not have evidence of in-the-wild exploitation, but does note public disclosure.

The advisory FAQ dances around the exploitation methodology without explaining; what we learn is that once an attacker had somehow delivered a malicious file to the target system, a user would need to manipulate the malicious file, but not necessarily click or open it. Without further detail, we can only speculate, but it’s plausible that simply opening a folder containing the file in Windows Explorer — including the Downloads folder — or inserting a USB drive, would be enough to trigger the vulnerability and see your NTLM hash leak silently for collection by the threat actor.

Some good news: Microsoft has removed NTLMv1 support from Windows 11 24H2 and Server 2025 onwards. Less good: it has been a whole two months since Microsoft last patched a zero-day NTLM disclosure vulnerability; that flaw was within MSHTML/Trident, and Windows 11 24H2 and Server 2025 were still vulnerable, since NTLMv2 is still supported across the board.

On the advisory for CVE-2025-21308, Microsoft does link to documents describing a mitigation technique: restricting NTLM traffic. This is certainly worth a look, since a representative of reporting research organization 0patch has confirmed that NTLMv2 is affected by CVE-2025-21308.

Windows Installer: zero-day EoP

Installing or updating software often requires elevated privileges, and researchers and threat actors have known this for a long time. The advisory for CVE-2025-21275 doesn’t weigh us down with lengthy explanations, it simply says that successful exploitation leads to SYSTEM privileges. Microsoft is aware of public disclosure of this vulnerability, but not in-the-wild exploitation.

CVE-2025-21275 is the latest in a long line of Windows Installer elevation of privilege vulnerabilities; Microsoft has now published 37 Windows Installer elevation of privilege vulnerabilities in total since the start of 2020, although only five of those have been zero-days, with only CVE-2024-38014 known by Microsoft to have been exploited prior to publication in September 2024.

PGM: critical RCE

Microsoft’s in-house research teams are a reliable source of vulnerability discovery in Microsoft products, and today we get patches for the self-discovered CVE-2025-21307, a critical RCE in the Windows Reliable Multicast Transport Driver (RMCAST) with a CVSSv3 base score of 9.8. The vulnerability is only exploitable on a system where a program is listening on a Pragmatic General Multicast (PGM) port.

In 2025, you might very well expect that any service that a major commercial operating system exposes to the network would provide at least some form of authentication capability, but if so, prepare to be disappointed by the Windows implementation of PGM. The concept was first described in RFC 3208, which was published in 2001 in an Experimental state and stayed that way. As Microsoft themselves put it, “the PGM specification [RFC3208] is ambiguous in a number of areas”.

Given the lack of required user interaction and remote attack vector for CVE-2025-21307, it’s well worth asking yourself: does our firewall allow a PGM receiver to receive inbound traffic from the public internet? If so, the second-best time to prevent that is right now.

OLE: critical RCE

Outlook admins who force their users to read emails in plain text only can skip this paragraph, but everyone else should be aware of CVE-2025-21298, a Windows Object Linking and Embedding (OLE) critical RCE with a CVSSv3 base score of 9.8. The eternal threat of the malicious inbound email finds expression again here; just previewing the wrong email in Outlook is all it takes for an attacker to achieve code execution in the context of the user. All versions of Windows receive a patch.

Microsoft lifecycle update

In Microsoft product lifecycle news, Visual Studio 2022 17.6 LTSC receives its last update today.

Summary Charts

A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday January 2025
A bar chart showing the distribution of vulnerabilities by impact type for Microsoft Patch Tuesday January 2025
A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday January 2025
Windows Telephony Service looming large this month

Summary tables

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21380 Azure Marketplace SaaS Resources Information Disclosure Vulnerability No No 8.8
CVE-2025-21403 On-Premises Data Gateway Information Disclosure Vulnerability No No 6.4

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21178 Visual Studio Remote Code Execution Vulnerability No No 8.8
CVE-2025-21176 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability No No 8.8
CVE-2025-21172 .NET and Visual Studio Remote Code Execution Vulnerability No No 7.5
CVE-2025-21171 .NET Remote Code Execution Vulnerability No No 7.5
CVE-2024-50338 GitHub: CVE-2024-50338 Malformed URL allows information disclosure through git-credential-manager No No 7.4
CVE-2025-21405 Visual Studio Elevation of Privilege Vulnerability No No 7.3
CVE-2025-21173 .NET Elevation of Privilege Vulnerability No No 7.3

ESU Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21307 Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability No No 9.8
CVE-2025-21298 Windows OLE Remote Code Execution Vulnerability No No 9.8
CVE-2025-21411 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21413 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21233 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21236 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21237 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21243 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21244 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21252 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21266 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21282 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21302 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21303 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21306 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21273 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21286 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21305 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21339 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21246 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21417 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21250 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21240 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21238 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21223 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21409 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21245 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21293 Active Directory Domain Services Elevation of Privilege Vulnerability No No 8.8
CVE-2025-21297 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-21309 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-21295 SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability No No 8.1
CVE-2025-21294 Microsoft Digest Authentication Remote Code Execution Vulnerability No No 8.1
CVE-2025-21287 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21378 Windows CSC Service Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21281 Microsoft COM for Windows Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21389 Windows upnphost.dll Denial of Service Vulnerability No No 7.5
CVE-2025-21300 Windows upnphost.dll Denial of Service Vulnerability No No 7.5
CVE-2025-21276 Windows MapUrlToZone Denial of Service Vulnerability No No 7.5
CVE-2025-21218 Windows Kerberos Denial of Service Vulnerability No No 7.5
CVE-2025-21220 Microsoft Message Queuing Information Disclosure Vulnerability No No 7.5
CVE-2025-21251 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21270 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21277 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21285 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21289 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21290 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21230 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-21231 IP Helper Denial of Service Vulnerability No No 7.5
CVE-2025-21296 BranchCache Remote Code Execution Vulnerability No No 7.5
CVE-2025-21331 Windows Installer Elevation of Privilege Vulnerability No No 7.3
CVE-2025-21211 Secure Boot Security Feature Bypass Vulnerability No No 6.8
CVE-2024-7344 Cert CC: CVE-2024-7344 Howyar Taiwan Secure Boot Bypass No No 6.7
CVE-2025-21249 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21255 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21258 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21260 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21263 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21265 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21327 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21341 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21226 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21227 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21228 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21229 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21232 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21256 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21261 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21310 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21324 Windows Digital Media Elevation of Privilege Vulnerability No No 6.6
CVE-2025-21308 Windows Themes Spoofing Vulnerability No Yes 6.5
CVE-2025-21217 Windows NTLM Spoofing Vulnerability No No 6.5
CVE-2025-21272 Windows COM Server Information Disclosure Vulnerability No No 6.5
CVE-2025-21288 Windows COM Server Information Disclosure Vulnerability No No 6.5
CVE-2025-21278 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability No No 6.2
CVE-2025-21242 Windows Kerberos Information Disclosure Vulnerability No No 5.9
CVE-2025-21336 Windows Cryptographic Information Disclosure Vulnerability No No 5.6
CVE-2025-21316 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21318 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21319 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21320 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21321 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21274 Windows Event Tracing Denial of Service Vulnerability No No 5.5
CVE-2025-21374 Windows CSC Service Information Disclosure Vulnerability No No 5.5
CVE-2025-21215 Secure Boot Security Feature Bypass Vulnerability No No 4.6
CVE-2025-21213 Secure Boot Security Feature Bypass Vulnerability No No 4.6
CVE-2025-21269 Windows HTML Platforms Security Feature Bypass Vulnerability No No 4.3
CVE-2025-21268 MapUrlToZone Security Feature Bypass Vulnerability No No 4.3
CVE-2025-21329 MapUrlToZone Security Feature Bypass Vulnerability No No 4.3
CVE-2025-21328 MapUrlToZone Security Feature Bypass Vulnerability No No 4.3
CVE-2025-21189 MapUrlToZone Security Feature Bypass Vulnerability No No 4.3
CVE-2025-21332 MapUrlToZone Security Feature Bypass Vulnerability No No 4.3
CVE-2025-21210 Windows BitLocker Information Disclosure Vulnerability No No 4.2
CVE-2025-21214 Windows BitLocker Information Disclosure Vulnerability No No 4.2
CVE-2025-21312 Windows Smart Card Reader Information Disclosure Vulnerability No No 2.4

ESU Windows Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21338 GDI+ Remote Code Execution Vulnerability No No 7.8

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21187 Microsoft Power Automate Remote Code Execution Vulnerability No No 7.8

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21385 Microsoft Purview Information Disclosure Vulnerability No No 8.8
CVE-2025-21363 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-21344 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7.8
CVE-2025-21361 Microsoft Outlook Remote Code Execution Vulnerability No No 7.8
CVE-2025-21345 Microsoft Office Visio Remote Code Execution Vulnerability No No 7.8
CVE-2025-21356 Microsoft Office Visio Remote Code Execution Vulnerability No No 7.8
CVE-2025-21365 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-21402 Microsoft Office OneNote Remote Code Execution Vulnerability No No 7.8
CVE-2025-21364 Microsoft Excel Security Feature Bypass Vulnerability No No 7.8
CVE-2025-21354 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21362 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-21360 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21366 Microsoft Access Remote Code Execution Vulnerability No Yes 7.8
CVE-2025-21395 Microsoft Access Remote Code Execution Vulnerability No Yes 7.8
CVE-2025-21186 Microsoft Access Remote Code Execution Vulnerability No Yes 7.8
CVE-2025-21348 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7.2
CVE-2025-21346 Microsoft Office Security Feature Bypass Vulnerability No No 7.1
CVE-2025-21357 Microsoft Outlook Remote Code Execution Vulnerability No No 6.7
CVE-2025-21393 Microsoft SharePoint Server Spoofing Vulnerability No No 6.3

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-21311 Windows NTLM V1 Elevation of Privilege Vulnerability No No 9.8
CVE-2025-21239 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21241 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21248 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21292 Windows Search Service Elevation of Privilege Vulnerability No No 8.8
CVE-2025-21291 Windows Direct Show Remote Code Execution Vulnerability No No 8.8
CVE-2025-21224 Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability No No 8.1
CVE-2025-21370 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21234 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21235 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21335 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-21333 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-21334 Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-21382 Windows Graphics Component Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21271 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21275 Windows App Package Installer Elevation of Privilege Vulnerability No Yes 7.8
CVE-2025-21304 Microsoft DWM Core Library Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21315 Microsoft Brokering File System Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21372 Microsoft Brokering File System Elevation of Privilege Vulnerability No No 7.8
CVE-2025-21326 Internet Explorer Remote Code Execution Vulnerability No No 7.8
CVE-2025-21343 Windows Web Threat Defense User Service Information Disclosure Vulnerability No No 7.5
CVE-2025-21330 Windows Remote Desktop Services Denial of Service Vulnerability No No 7.5
CVE-2025-21207 Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability No No 7.5
CVE-2025-21299 Windows Kerberos Security Feature Bypass Vulnerability No No 7.1
CVE-2025-21314 Windows SmartScreen Spoofing Vulnerability No No 6.5
CVE-2025-21313 Windows Security Account Manager (SAM) Denial of Service Vulnerability No No 6.5
CVE-2025-21301 Windows Geolocation Service Information Disclosure Vulnerability No No 6.5
CVE-2025-21193 Active Directory Federation Server Spoofing Vulnerability No No 6.5
CVE-2025-21202 Windows Recovery Environment Agent Elevation of Privilege Vulnerability No No 6.1
CVE-2025-21225 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability No No 5.9
CVE-2025-21257 Windows WLAN AutoConfig Service Information Disclosure Vulnerability No No 5.5
CVE-2025-21340 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability No No 5.5
CVE-2025-21280 Windows Virtual Trusted Platform Module Denial of Service Vulnerability No No 5.5
CVE-2025-21284 Windows Virtual Trusted Platform Module Denial of Service Vulnerability No No 5.5
CVE-2025-21317 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21323 Windows Kernel Memory Information Disclosure Vulnerability No No 5.5
CVE-2025-21219 MapUrlToZone Security Feature Bypass Vulnerability No No 4.3

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.