Skip to main content

Microsoft’s February Security Update: Fewer Vulnerabilities, But Still a Priority

Microsoft’s February security update contains fewer vulnerabilities for administrators to address compared to a month ago, but there are still several critical flaws that require immediate attention.

Top Security Concerns

  • Two Zero-Day Vulnerabilities: Attackers are actively exploiting two zero-day vulnerabilities in the wild, CVE-2025-21418 (CVSS score 7.8) and CVE-2025-21391 (CVSS 7.1). These vulnerabilities can be exploited to gain SYSTEM-level privileges on affected systems.
  • Zero-Day Patch: Microsoft has released a patch for a previously disclosed zero-day vulnerability (CVE-2025-21376) in December 2024.
  • Common Vulnerabilities and Exposures (CVEs): The update addresses 63 unique CVEs, including several that can have severe consequences for affected organizations.

CVEs and Their Severity

  • CVE-2025-21418: A local exploit vulnerability that allows attackers to disable security tooling, dump credentials, or move laterally across the network.
  • CVE-2025-21391: A Windows Storage zero-day vulnerability that can be exploited to delete targeted files on a system.
  • CVE-2025-21377: An NTLM hash disclosure spoofing vulnerability that can be exploited to steal NTLM credentials.

Critical Flaws

  • CVE-2025-21379: A remote code execution (RCE) vulnerability in the DHCP client service (CVSS Score 7.1).
  • CVE-2025-21177: A privilege elevation vulnerability in Microsoft Dynamics 365 Sales (CVSS Score 8.7).
  • CVE-2025-21381: An RCE vulnerability in Microsoft Excel (CVSS 7.8).
  • CVE-2025-21376: An RCE vulnerability in Windows LDAP (CVSS 8.1).

Impact and Recommendations

  • Organizations: Treat CVE-2025-21377 as a high-priority bug that needs immediate attention. Even with a patch available, the vulnerability can be exploited to steal NTLM credentials.
  • Administrators: Apply patches for CVE-2025-21418, CVE-2025-21391, and CVE-2025-21379 immediately.
  • Customers: Take note of the CAR (customer action required) attribute in CVE-2025-21177, which means no customer action is required, but Microsoft has already addressed the issue on its end.

Security Researchers’ Insights

  • Kev Breen: Senior director, cyber threat research at Immersive Labs, emphasizes the importance of addressing CVE-2025-21377 and CVE-2025-21418.
  • Natalie Silva: Lead cyber security engineer at Immersive Labs, highlights the risk of CVE-2025-21391, which can be exploited to delete targeted files on a system.
  • Tyler Reguly: Associate director security R\&D at Fortra, notes that the update should be issued outside of Patch Tuesday since it does not require customer action.

Source Link