Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

Patch Tuesday: Microsoft patches at least 70 security bugs and flagged five zero-days in the “exploitation detected” category.

Microsoft security

Microsoft on Tuesday released security patches covering at least 70 vulnerabilities across the Windows OS and software stack and called urgent attention to five zero-days marked in the “exploitation detected” category.

As part of the scheduled batch of Patch Tuesday updates, Redmond’s security response team warned that malicious hackers are already exploiting bugs in the Microsoft Scripting Engine and the oft-targeted Windows Common Log File System (CLFS) Driver.

The five zero-days marked for immediate attention:

  • CVE-2025-30397 — Scripting Engine Memory Corruption Vulnerability (remote code execution). Access of resource using incompatible type (‘type confusion’) in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. This attack requires an authenticated client to click a link so that an unauthenticated attacker can initiate remote code execution.
  • CVE-2025-32709 — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.  This is a use-after-free memory corruption bug that allows an authorized attacker to elevate privileges locally. An attacker who successfully exploited this vulnerability could gain administrator privileges.
  • CVE-2025-32706 — Windows Common Log File System Driver Elevation of Privilege Vulnerability. Microsoft describes this as an improper input validation flaw in Windows Common Log File System Driver that allows an authorized attacker to elevate privileges locally.
  • CVE-2025-32701 — Windows Common Log File System Driver Elevation of Privilege Vulnerability.  This is a use-after-free memory corruption bug that allows an authorized attacker to elevate privileges locally.
  • CVE-2025-30400 –Microsoft DWM Core Library Elevation of Privilege Vulnerability.  Described as a use-after-free in Windows DWM that allows an authorized attacker to elevate privileges locally. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

The company did not publish indicators of compromise (IOCs) or telemetry data to help defenders hunt for infections. Information on the targeting and victims of the zero-days remain a mystery.

Microsoft has struggled to keep pace with attackers exploiting bugs in the CLFS and has been experimenting with a major new security mitigation to thwart a surge in cyberattacks from APT and ransomware threat actors.

The company has been adding Hash-based Message Authentication Codes (HMAC) to detect unauthorized modifications to CLFS log files and cover one of the most attractive Windows OS attack surfaces.

In all, Microsoft documented at least 70 security vulnerabilities across the Windows OS and software components, with six bulletins marked as “critical.”

Advertisement. Scroll to continue reading.

The critical-severity bugs, which all carry remote code execution risk, affect the Windows Remote Desktop Services (an unauthorized attacker to execute code over a network); Microsoft Office (use-after-free allows an unauthorized attacker to execute code locally); and the Microsoft Virtual Machine Bus VMBUS (race condition that allows an authorized attacker to execute code over a network).

Related: Microsoft Intros HMAC-Based Mitigation for Windows Logfile Flaws

Related: Microsoft Patches Windows Zero-Day Exploited by Russian Hackers

Related: Microsoft Raises Alert for Under-Attack Windows Flaw

Related: Anatomy of a BlackCat Attack Through the Eyes of Incident Response

Related: Windows Zero-Day Exploited in Nokoyawa Ransomware Attacks

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.