Microsoft at the moment launched updates to plug at the least 121 safety holes in its Home windows working techniques and software program, together with one vulnerability that’s already being exploited within the wild. Eleven of these flaws earned Microsoft’s most-dire “essential” ranking, that means malware or malcontents may exploit them with little to no interplay from Home windows customers.

The zero-day flaw already seeing exploitation is CVE-2025-29824, an area elevation of privilege bug within the Home windows Widespread Log File System (CLFS) driver. Microsoft charges it as “essential,” however as Chris Goettl from Ivanti factors out, risk-based prioritization warrants treating it as essential.
This CLFS part of Home windows is not any stranger to Patch Tuesday: In accordance with Tenable’s Satnam Narang, since 2022 Microsoft has patched 32 CLFS vulnerabilities — averaging 10 per yr — with six of them exploited within the wild. The final CLFS zero-day was patched in December 2024.
Narang notes that whereas flaws permitting attackers to put in arbitrary code are constantly high general Patch Tuesday options, the info is reversed for zero-day exploitation.
“For the previous two years, elevation of privilege flaws have led the pack and, to date in 2025, account for over half of all zero-days exploited,” Narang wrote.
Rapid7’s Adam Barnett warns that any Home windows defenders liable for an LDAP server — which suggests nearly any group with a non-trivial Microsoft footprint — ought to add patching for the essential flaw CVE-2025-26663 to their to-do checklist.
“With no privileges required, no want for consumer interplay, and code execution presumably within the context of the LDAP server itself, profitable exploitation can be a sexy shortcut to any attacker,” Barnett stated. “Anybody questioning if at the moment is a re-run of December 2024 Patch Tuesday can take some small solace in the truth that the worst of the trio of LDAP essential RCEs revealed on the finish of final yr was possible simpler to take advantage of than at the moment’s instance, since at the moment’s CVE-2025-26663 requires that an attacker win a race situation. Regardless of that, Microsoft nonetheless expects that exploitation is extra possible.”
Among the many essential updates Microsoft patched this month are distant code execution flaws in Home windows Distant Desktop providers (RDP), together with CVE-2025-26671, CVE-2025-27480 and CVE-2025-27482; solely the latter two are rated “essential,” and Microsoft marked each of them as “Exploitation Extra Probably.”
Maybe probably the most widespread vulnerabilities fastened this month have been in net browsers. Google Chrome up to date to repair 13 flaws this week, and Mozilla Firefox fastened eight bugs, with presumably extra updates coming later this week for Microsoft Edge.
Because it tends to do on Patch Tuesdays, Adobe has launched 12 updates resolving 54 safety holes throughout a spread of merchandise, together with ColdFusion, Adobe Commerce, Expertise Supervisor Varieties, After Results, Media Encoder, Bridge, Premiere Professional, Photoshop, Animate, AEM Screens, and FrameMaker.
Apple customers could have to patch as properly. On March 31, Apple launched an enormous safety replace (greater than three gigabytes in measurement) to repair points in a spread of their merchandise, together with at the least one zero-day flaw.
And in case you missed it, on March 31, 2025 Apple launched a fairly giant batch of safety updates for a variety of their merchandise, from macOS to the iOS working techniques on iPhones and iPads.
Earlier at the moment, Microsoft included a be aware saying Home windows 10 safety updates weren’t obtainable however can be launched as quickly as potential. It seems from searching askwoody.com that this snafu has since been rectified. Both means, when you run into issues making use of any of those updates please go away a be aware about it within the feedback under, as a result of the probabilities are good that another person had the identical drawback.
As ever, please take into account backing up your information and or units previous to updating, which makes it far easier to undo a software program replace gone awry. For extra granular particulars on at the moment’s Patch Tuesday, take a look at the SANS Web Storm Middle’s roundup. Microsoft’s replace information for April 2025 is right here.
For extra particulars on Patch Tuesday, take a look at the write-ups from Action1 and Automox.