Other significant vulnerabilities patched in this release included CVE-2025-26633 (a security feature bypass in Microsoft Management Console), CVE-2025-24985 (a remote code execution flaw in Windows Fast FAT File System Driver), and CVE-2025-24993 (a remote code execution vulnerability in Windows NTFS). According to cybersecurity firm ESET, which discovered and reported the vulnerability, attackers have been exploiting this flaw in the wild since March 2023, making it one of the longest-running active exploits before remediation. #ESETresearch has discovered a zero day exploit abusing #CVE-2025-24983 vulnerability in Windows Kernel to elevate privileges (#LPE). However, the vulnerability also affects newer but still older Windows versions, including Windows Server 2016 and Windows 10 systems running build 1809 and earlier. Despite its significant impact, Microsoft has rated the vulnerability as “Important” rather than “Critical” due to the high complexity of exploitation, which requires attackers to win a race condition. Security researchers continue to emphasize that privilege escalation vulnerabilities like CVE-2025-24983 remain valuable tools for attackers seeking to establish persistence within compromised networks. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Mar 2025 14:50:12 +0000