Microsoft patches over 160 vulnerabilities, including 3 actively exploited zero-days

Microsoft patches over 160 vulnerabilities, including 3 actively exploited zero-days

Among the flaws addressed in this month’s batch of updates are three vulnerabilities in the Windows Hyper-V NT Kernel Integration VSP (CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335) actively exploited in attacks. The flaws allow attackers to escalate their privileges to SYSTEM-level access.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added the three vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.

In addition to the Hyper-V flaws, Microsoft has also fixed five publicly known vulnerabilities, including CVE-2025-21186, CVE-2025-21366, and CVE-2025-21395 (Microsoft Access Remote Code Execution Vulnerability), CVE-2025-21275 (Windows App Package Installer Elevation of Privilege Vulnerability), CVE-2025-21308 (Windows Themes Spoofing Vulnerability).

The first three vulnerabilities (CVE-2025-21186, CVE-2025-21366, CVE-2025-21395) could allow remote code execution in Microsoft Access, potentially leading to full system compromise if exploited. The App Package Installer flaw (CVE-2025-21275) enables attackers to escalate privileges, while the Windows Themes Spoofing vulnerability (CVE-2025-21308) could be leveraged in social engineering attacks to mislead users.

Microsoft has not disclosed the details of how these vulnerabilities might be actively exploited in the wild, nor has it identified the threat actors behind any attacks.

In addition to the above-mentioned flaws, Redmond addressed a slew of high-risk issues affecting Microsoft NEGOEX, Microsoft Excel, Microsoft Office, Microsoft Windows OLE, Microsoft Visual Studio, Microsoft .NET, .NET Framework, and Visual Studio, Microsoft RMCAST, Windows NTLM V1, Microsoft Internet Explorer, Microsoft Word, and other software.

Back to the list

Latest Posts

Moldovan authorities arrest suspect tied to DoppelPaymer ransomware attacks

Moldovan authorities arrest suspect tied to DoppelPaymer ransomware attacks

The suspect remains in custody and is awaiting extradition to the Netherlands.
13 May 2025
North Korean TA406 hackers target Ukraine in ongoing phishing campaigns

North Korean TA406 hackers target Ukraine in ongoing phishing campaigns

The campaigns aim to harvest credentials and deliver malware, likely to gather intelligence related to the ongoing Russian invasion of Ukraine.
13 May 2025
International operation takes down Anyproxy and 5Socks botnet services

International operation takes down Anyproxy and 5Socks botnet services

In a separate action, German authorities shut down the German server infrastructure of the crypto swapping service eXch, suspected of laundering illicit funds.
13 May 2025