Microsoft’s Patch Tuesday: 63 Security Flaws Fixed, Including Two Actively Exploited!
Microsoft’s Patch Tuesday fixes 63 security flaws, including two actively exploited vulnerabilities. Among them, CVE-2025-21391 lets attackers delete files, and CVE-2025-21418 grants SYSTEM privileges. Microsoft’s update also addresses a critical remote code execution vulnerability in the HPC Pack. As always, keep your software updated, or risk living on the edge—Chromium-based or otherwise!

Hot Take:
Microsoft’s latest Patch Tuesday is like a digital game of whack-a-mole, with the tech giant busy whacking 63 pesky vulnerabilities, including two that are actively trying to play hide and seek in the wild. It’s like trying to catch greased pigs at a fair – just when you think you’ve got one under control, another one slips away. But don’t worry, Microsoft’s on it, with a hammer in one hand and a patch in the other!
Key Points:
- Microsoft released fixes for 63 security vulnerabilities, including two actively exploited ones.
- Critical vulnerabilities include CVE-2025-21391 and CVE-2025-21418, both involving privilege escalation.
- The most severe vulnerability, CVE-2025-21198, is a remote code execution flaw in the HPC Pack.
- Other notable vulnerabilities include CVE-2025-21376 and CVE-2025-21377 affecting LDAP and NTLMv2, respectively.
- Patch updates were also released by other vendors like HP, demonstrating a collective cybersecurity effort.