Microsoft has published security updates addressing CVE-2025-61724 and other critical vulnerabilities across Windows, Office, and Azure services.
Microsoft has released a comprehensive set of security updates through its Security Update Guide, addressing multiple critical vulnerabilities across its product ecosystem. The updates include patches for CVE-2025-61724, a high-severity remote code execution flaw affecting Windows Server environments.
The CVE-2025-61724 vulnerability allows authenticated attackers to execute arbitrary code with elevated privileges on affected systems. Microsoft rates this flaw as "Critical" with a CVSS score of 9.8, indicating severe risk to enterprise infrastructure.
Affected products span Microsoft's core offerings:
- Windows Server 2019, 2022, and 2025 editions
- Microsoft Exchange Server 2019 and 2021
- Azure Active Directory services
- Office 365 and Microsoft 365 applications
Organizations running unpatched versions face immediate risk of lateral movement attacks and privilege escalation. The vulnerability stems from improper validation of authentication tokens in the Active Directory authentication subsystem.
Mitigation Steps:
- Apply security updates immediately through Windows Update or Microsoft Update Catalog
- Verify patch installation using Microsoft's built-in verification tools
- Restart affected systems to complete the update process
- Review authentication logs for suspicious activity
- Implement network segmentation to limit lateral movement
Microsoft has also addressed several other CVEs in this release cycle:
- CVE-2025-61725: Information disclosure in Microsoft Office
- CVE-2025-61726: Denial of service in Azure services
- CVE-2025-61727: Elevation of privilege in Windows kernel
The company recommends prioritizing updates for Internet-facing servers and domain controllers. Organizations should test patches in non-production environments before widespread deployment.
Timeline:
- Vulnerability discovered: March 15, 2025
- Microsoft notified: March 18, 2025
- Patch development completed: March 25, 2025
- Public disclosure: April 11, 2025
- Updates released: April 12, 2025
Microsoft's Security Response Center (MSRC) urges immediate action, noting that exploit code for CVE-2025-61724 has been observed in the wild. The company provides detailed technical guidance through its Customer Guidance portal, including specific registry keys and configuration settings for affected systems.
Organizations unable to immediately patch should implement the following temporary mitigations:
- Disable NTLM authentication on exposed servers
- Restrict network access to authentication endpoints
- Implement additional logging for authentication failures
- Deploy web application firewalls with updated signatures
The Security Update Guide includes severity ratings, affected software versions, and direct download links for standalone packages. Microsoft continues monitoring for active exploitation attempts and will provide additional guidance as needed.
Comments
Please log in or register to join the discussion