{"id":103475,"date":"2025-05-15T12:16:09","date_gmt":"2025-05-15T12:16:09","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/103475\/"},"modified":"2025-05-15T12:16:09","modified_gmt":"2025-05-15T12:16:09","slug":"windows-is-under-attack-microsoft-confirms-act-now-cisa-warns","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/103475\/","title":{"rendered":"Windows Is Under Attack, Microsoft Confirms \u2014 Act Now, CISA Warns"},"content":{"rendered":"<p class=\"color-body light-text\" role=\"button\">Multiple zero-day vulnerabilities are being exploited by attackaers, Microsoft warns.<\/p>\n<p>SOPA Images\/LightRocket via Getty Images <\/p>\n<p>Update, May 15, 2025: This story, originally published May 14, has been updated with a new warning from the Cybersecurity and Infrastructure Security Agency along with additional information regarding further confirmed Microsoft Windows vulnerabilities that are not known to be under active exploitation but need to be patched as soon as possible anyway. <\/p>\n<p>It\u2019s that time of the month again, when Patch Tuesday is quickly followed by Exploit Wednesday. The former is the monthly rollout of Microsoft\u2019s responses to <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/20\/587-windows-vulnerabilities---a-microsoft-security-record-breaker\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/20\/587-windows-vulnerabilities---a-microsoft-security-record-breaker\/\" target=\"_self\" aria-label=\"newly discovered vulnerabilities\" rel=\"noopener\">newly discovered vulnerabilities<\/a> in its services and products, and the latter is when hackers, cybercriminals and state-sponsored actors look to act upon these security disclosures before individuals and organizations have had the opportunity to update their systems. Unfortunately, Exploit Wednesday seems to have preceded Patch Tuesday this month, with Microsoft confirming multiple zero-day vulnerabilities that are known to be under attack before any fix was made available. Make no mistake, with security experts rating the risk prioritization of these exploits as critical, Windows users need to act fast.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/14\/new-warning---microsoft-copilot-ai-can-access-restricted-passwords\/\" target=\"_blank\" aria-label=\"New Warning \u2014 Microsoft Copilot AI Can Access Restricted Passwords\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/14\/new-warning---microsoft-copilot-ai-can-access-restricted-passwords\/\">ForbesNew Warning \u2014 Microsoft Copilot AI Can Access Restricted PasswordsBy Davey Winder<\/a><\/p>\n<p>Windows CVE-2025-30397 Zero-Day Explained<\/p>\n<p>It is not uncommon, sadly, for Windows users to find themselves faced with <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/27\/windows-passwords-at-risk-as-new-0-day-confirmed-act-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/27\/windows-passwords-at-risk-as-new-0-day-confirmed-act-now\/\" target=\"_self\" aria-label=\"zero-day vulnerabilities\" rel=\"noopener\">zero-day vulnerabilities<\/a> that are being exploited by attackers in the wild. In March, for example, <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/12\/critical-windows-warning-as-6-zero-day-attacks-confirmed-update-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/12\/critical-windows-warning-as-6-zero-day-attacks-confirmed-update-now\/\" target=\"_self\" aria-label=\"six zero-day attacks\" rel=\"noopener\">six zero-day attacks<\/a> were confirmed, while there were three such <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/15\/new-critical-microsoft-windows-warning-as-3-zero-day-attacks-underway\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/15\/new-critical-microsoft-windows-warning-as-3-zero-day-attacks-underway\/\" target=\"_self\" aria-label=\"active Windows exploits reported\" rel=\"noopener\">active Windows exploits reported<\/a> in January.<\/p>\n<p>The latest Microsoft Patch Tuesday <a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/\" aria-label=\"security rollout\">security rollout<\/a> has now dropped, and it doesn\u2019t make for very comforting reading at all. So, let\u2019s dive straight into the multiple zero-day exploits impacting Windows users, starting with that has got the security professionals very concerned indeed. This memory corruption vulnerability sits within the Windows scripting engine, and a successful exploit can allow an attacker to execute code over the network. Not only does CVE-2025-30397 affect all versions of the Windows operating system, but it is also confirmed by Microsoft as being exploited in the wild. \u201cMicrosoft\u2019s severity is rated as important and has CVSS 3.1 of 7.8,\u201d Chris Goettl, vice president of security product management at Ivanti, pointed out, adding that \u201crisk-based prioritization warrants treating this vulnerability as critical.\u201d<\/p>\n<p>While the official CVE severity-rating scores tend to provide a decent baseline for vulnerability appraisal, in the real world, things are not always that clear-cut. CVE-2025-30397 has a base score of 7.5, and Microsoft says that the attack complexity rating is high. So, what\u2019s the issue? \u201cThe advisory FAQ for <a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32709\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32709\" aria-label=\"CVE-2025-30397\">CVE-2025-30397<\/a> explains that successful exploitation requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode,\u201d Adam Barnett, lead software engineer at Rapid7 explains, \u201cand then causes the user to click a malicious link; there is no mention of a requirement for the user to actively reload the page in Internet Explorer Mode, so we must assume that exploitation requires only that the \u2018Allow sites to be reloaded in Internet Explorer\u2019 option is enabled.\u201d Barnett warned that as the users most likely to still require this kind of Internet Explorer compatibility are enterprise organizations, and the concept of migration is likely \u201cburied several layers deep in a dusty backlog,\u201d in Barnett\u2019s experience, then the pre-requisite conditions are already conveniently in place on the target asset and \u201cattack complexity is suddenly nice and low.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-5\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/11\/microsoft-confirms-critical-1010-cloud-security-vulnerability\/\" target=\"_blank\" aria-label=\"Critical 10\/10 Microsoft Cloud Security Vulnerability Confirmed\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/11\/microsoft-confirms-critical-1010-cloud-security-vulnerability\/\">ForbesCritical 10\/10 Microsoft Cloud Security Vulnerability ConfirmedBy Davey Winder<\/a><\/p>\n<p>Windows Under Attack: CVE-2025-32701, CVE-2025-32706, CVE-2025-32709 and CVE-2025-30400<\/p>\n<p>The remaining under-attack zero-day vulnerabilities are:<\/p>\n<p>CVE-2025-32709: an elevation of privilege vulnerability in the Windows ancillary function driver for WinSock that enables an attacker to gain admin privileges locally and impacts Windows Server 12 and later OS versions. Once again. Goettl warned that \u201crisk-based prioritization warrants treating this vulnerability as critical.\u201d<\/p>\n<p>CVE-2025-32701 and CVE-2025-32706 are a pair of zero-day vulnerabilities in the Windows Common Log File Driver System, and could enable a successful local attacker to gain system privileges. Impacting all versions of Windows, these types of security flaws are being closely monitored for detection by the Microsoft Threat Intelligence Center. \u201cSince Microsoft is aware of exploitation in the wild,\u201d Barnett said, \u201cwe know that someone else got there first, and there\u2019s no reason to suspect that threat actors will stop looking for ways to abuse CLFS any time soon.\u201d<\/p>\n<p>And finally, we come to another elevation of privilege zero-day vulnerability already being exploited by attackers, CVE-2025-30400, which impacts the Windows desktop window manager and affects Windows 10, Server 2016, and later OS versions. Barnett pointed out that this is great proof that such elevation of privileges vulnerabilities will never go out of fashion, what with Exploit Wednesday marking the one-year anniversary of CVE-2024-30051, which also hit the desktop windows manager.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-6\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/06\/windows-memory-exhaustion-network-crash-warning---no-microsoft-fix\/\" target=\"_blank\" aria-label=\"Remote Windows Network Crash Attack \u2014 No Microsoft Fix Available\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/06\/windows-memory-exhaustion-network-crash-warning---no-microsoft-fix\/\">ForbesRemote Windows Network Crash Attack \u2014 No Microsoft Fix AvailableBy Davey Winder<\/a><br \/>\nCybersecurity and Infrastructure Security Agency Says Act Before June 3 To Prevent Windows Exploits<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency has now joined the chorus of experts warning that these Windows zero-day vulnerabilities need to be addressed as a matter of urgency. A <a class=\"color-link\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/05\/13\/cisa-adds-five-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/05\/13\/cisa-adds-five-known-exploited-vulnerabilities-catalog\" aria-label=\"newly published alert\">newly published alert<\/a> has confirmed that CISA has added all five of the Windows zero-days to Known Exploited Vulnerabilities catalog, and that brings not only more than a little gravitas to the security warnings, but an obligation for certain federal agencies to apply the Microsoft patches to fix them no later than June 3rd, 2025. Of course, that is by the by for most readers, but it doesn\u2019t mean the CISA alert is meaningless. Indeed, the self-styled America\u2019s Cyber Defence Agency has strongly urged \u201call organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of catalog vulnerabilities as part of their vulnerability management practice.&#8221;<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-7\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/15\/276-million-patient-records-compromised---what-you-need-to-know\/\" target=\"_blank\" aria-label=\"276 Million Patient Records Compromised \u2014 What You Need To Know\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/15\/276-million-patient-records-compromised---what-you-need-to-know\/\">Forbes276 Million Patient Records Compromised \u2014 What You Need To KnowBy Davey Winder<\/a><br \/>\nIt\u2019s Not Just Zero-Days, These Windows Vulnerabilities Also Need Your Urgent Attention<\/p>\n<p>Although it makes sense to highlight the five zero-day vulnerabilities that Microsoft has confirmed are already being exploited in the wild, leaving unpatched Windows users open to attack, this security rollout also includes fixes for another 65 vulnerabilities that cannot be ignored. Mike Walters, co-founder of Action1, has mentioned two Microsoft Office vulnerabilities, for example. CVE-2025-30386 is a remote code execution flaw, and RCE is something that will make any security-aware reader shiver. The shivering is dulled a little by the fact that it is, somewhat oddly, classified as using a local attack vector. \u201cThis vulnerability is considered remote code execution,\u201d Walters explained, \u201cas it can be triggered by delivering a malicious document. If the affected user has administrative privileges, an attacker could gain full control of the system.\u201d All users, from the enterprise to consumers are at risk, Walters said, adding that the \u201cability to trigger exploitation via the Preview Pane further elevates the risk, as users may not even need to open the attachment explicitly.\u201d<\/p>\n<p>The second Microsoft Office vulnerability of note, CVE-2025-30377, is another RCE and similar to the first in that it can be used to execute arbitrary code. \u201cWhile the attack scenarios are comparable,\u201d Walters said, \u201cthis vulnerability is considered less likely to be exploited due to additional conditions or complexities in developing a reliable exploit.\u201d As both can result in full system compromise, neither should be underestimated, and patches should be applied as soon as possible.<\/p>\n<p>The advice, therefore, is simple. Act now, and ensure that you update your Windows systems with the latest security patches as a matter of some urgency.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-8\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/14\/googles-new-android-update---3-things-your-phone-can-no-longer-do\/\" target=\"_blank\" aria-label=\"Google\u2019s New Android Update \u2014 3 Things Your Phone Can No Longer Do\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/14\/googles-new-android-update---3-things-your-phone-can-no-longer-do\/\">ForbesGoogle\u2019s New Android Update \u2014 3 Things Your Phone Can No Longer DoBy Davey Winder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Multiple zero-day vulnerabilities are being exploited by attackaers, Microsoft warns. SOPA Images\/LightRocket via Getty Images Update, May 15,&hellip;\n","protected":false},"author":2,"featured_media":103476,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[507,47704,9025,53,16,15,47703,47700,11736,47701,47702,47705],"class_list":{"0":"post-103475","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-microsoft","9":"tag-microsoft-security-warning","10":"tag-patch-tuesday","11":"tag-technology","12":"tag-uk","13":"tag-united-kingdom","14":"tag-update-windows-now","15":"tag-windows-cyberattack","16":"tag-windows-security-warning","17":"tag-windows-under-attack","18":"tag-windows-zero-day","19":"tag-windows-zero-day-attacks-confirmed"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114511805516073395","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/103475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=103475"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/103475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/103476"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=103475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=103475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=103475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}