APPLE Software Patch
About Apple Security Updates
“For our customers protection, Apple doesn’t disclose 0r confirm security issues until an investigation has been done and patches or software releases are available. Keeping your software up to date is one of the most important things you can do to maintain your Apple products security”. (Source: Apple Support)
As of 3/11/25 Apples emergency patch fixes a vulnerability CVE-2025024201 which has been exploited in zero-day attacks.
“Maliciously crafted web content may be able to break out of Web Content sandbox,” Apple added. “This is an out-of-bounds write issue that Apple first fixed in iOS 17.2 while blocking the zero-day attempts”. (Source: Apple Support)
Updates with patches include iOS 18.3.2, iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, and vision 2.3.2.
Apple has not released a lot of detail for security reasons. The vulnerabilities could allow high impact attacks like RCE Remote Code Execution, Privilege Escalation, data theft and device takeover.
All Apple users are advised to upgrade their Apple products as soon as possible.
Microsoft Patch Tuesday
Microsoft Patches 57 Security Vulnerabilities
On March 11, 2025 Microsoft released a Patch Tuesday update addressing 57 vulnerabilities, including six critical flaws and several zero-day vulnerabilities that were actively exploited.
The six critical flaws had RCE Remote Code Execution Issues:
- CVE 2025-24057 Microsoft Office
- CVE 2025-26645 Remote Desktop Client
- CVE 2025-24064 DNS Server Role (Windows Server)
- CVE 2025-24035 Remote Desktop Services (RDS)
- CVE 2025 24045 Remote Desktop Services (RDS)
- CVE 2025-24084 Windows Subsystem for Linux (WSL)
Of the seven Zero Day Vulnerabilities six are being exploited currently:
- CVE 2025-24983 Win32 Kernel Subsystem Elevation of Privilege
- CVE 2025-24985 Windows Fast Fat RCE
- CVE 2025-24991 & CVE 2025-24993 NTFS Zero Day
- CVE 2025-26633 Microsoft Management Console
- CVE 2025-26630 Microsoft Access
Immediate Action Recommends:
- Patch immediately, especially systems running Windows 10, 11, and Windows Server.
- Audit usage of VHD files and removable media to minimize potential attack surfaces.
- Educate users on avoiding suspicious attachments or unexpected USB devices.
- Monitor for abnormal system behavior that could hint at privilege escalation or memory exploitation.
To learn more about Topgallant Partners or to Read More Security Blog Posts Click on the Link Below.
http://www.topgallant-partners.com
0