Patch Panic: Urgent Fixes Needed for Exploited Zero-Day Vulnerabilities in Windows and CentreStack!
CISA urges organizations to patch zero-day vulnerabilities in Gladinet CentreStack and Microsoft Windows. The CentreStack flaw (CVE-2025-30406) can lead to remote code execution, while the Windows issue (CVE-2025-29824) allows privilege escalation. Both are actively exploited, with fixes available. Don’t wait until your data’s in the wild—patch now!

Hot Take:
Looks like Gladinet and Microsoft have been playing a dangerous game of “Whack-a-Mole” with zero-day vulnerabilities. While they patch up one hole, another seems to pop up faster than you can say “cybersecurity breach.” It’s a classic case of “patch now or forever hold your peace” – because if you don’t, those cybercriminals will be holding something else that’s a lot less peaceful.
Key Points:
- Two zero-day vulnerabilities in Gladinet CentreStack and Microsoft Windows have been exploited.
- The CentreStack bug (CVE-2025-30406) impacts cryptographic keys, enabling remote code execution.
- The Windows flaw (CVE-2025-29824) is a use-after-free issue in the CLFS driver, allowing privilege escalation.
- CISA urges immediate patching, with a deadline of April 29 for federal agencies.
- Patches and mitigations should be applied by all organizations, not just federal agencies.
Already a member? Log in here