Microsoft have released a security advisory on the 9th of April 2025 in line with their regular monthly patch schedule which includes a number of updates to address vulnerabilities in ten (10) medium risk products.
These updates address vulnerabilities which may impact services through Elevation of Privilege, Remote Code Execution, Denial of Service, Security Restriction Bypass, Spoofing, and Information Disclosure.
For more information please see: Microsoft Security Update
This release consists of security updates for the following products, features and roles:
- Active Directory Domain Services
- ASP.NET Core
- Azure Local
- Azure Local Cluster
- Azure Portal Windows Admin Center
- Dynamics Business Central
- Microsoft AutoUpdate (MAU)
- Microsoft Edge (Chromium-based)
- Microsoft Edge for iOS
- Microsoft Office
- Microsoft Office Excel
- Microsoft Office OneNote
- Microsoft Office SharePoint
- Microsoft Office Word
- Microsoft Streaming Service
- Microsoft Virtual Hard Drive
- OpenSSH for Windows
- Outlook for Android
- Power Automate
- Remote Desktop Client
- Remote Desktop Gateway Service
- RPC Endpoint Mapper Service
- System Center
- Visual Studio
- Visual Studio Code
- Visual Studio Tools for Applications and SQL Server Management Studio
- Windows Active Directory Certificate Services
- Windows BitLocker
- Windows Bluetooth Service
- Windows Common Log File System Driver
- Windows Cryptographic Services
- Windows Defender Application Control (WDAC)
- Windows Digital Media
- Windows DWM Core Library
- Windows Hello
- Windows HTTP.sys
- Windows Hyper-V
- Windows Installer
- Windows Kerberos
- Windows Kernel
- Windows Kernel Memory
- Windows Kernel-Mode Drivers
- Windows LDAP - Lightweight Directory Access Protocol
- Windows Local Security Authority (LSA)
- Windows Local Session Manager (LSM)
- Windows Mark of the Web (MOTW)
- Windows Media
- Windows Mobile Broadband
- Windows NTFS
- Windows Power Dependency Coordinator
- Windows Remote Desktop Services
- Windows Resilient File System (ReFS)
- Windows Routing and Remote Access Service (RRAS)
- Windows Secure Channel
- Windows Security Zone Mapping
- Windows Shell
- Windows Standards-Based Storage Management Service
- Windows Subsystem for Linux
- Windows TCP/IP
- Windows Telephony Service
- Windows Universal Plug and Play (UPnP) Device Host
- Windows Update Stack
- Windows upnphost.dll
- Windows USB Print Driver
- Windows Virtualization-Based Security (VBS) Enclave
- Windows Win32K - GRFX
CVE-2025-29824 is being exploited in the wild and allows local attackers to gain SYSTEM privileges on the device/system.
Please contact the Matsco Solutions team on the below if you would like any further information or would like to schedule a maintenance.
support@matscosolutions.com
Beijing +86 400 120 2782
Hong Kong +852 8101 8418
London +44 (0)20 7821 4950
New York +1 866 446 9226
Singapore +65 6100 1090