Patch Tuesday: 6 Critical Bugs, 51 Vulnerabilities, and a DNS Dance-Off!

March’s Patch Tuesday is a light affair with 51 vulnerabilities, six rated critical, and six already exploited. The star of the show? A critical Windows Domain Name Service vulnerability (CVE-2025-24064) that could be exploited with a “perfectly timed” dynamic DNS update. It’s like playing Minesweeper but with real world stakes!

Hot Take:

March’s Patch Tuesday: Like a box of chocolates, you never know what you’re gonna get…except this time, you’re mostly getting vulnerabilities. With only 51 of them to choose from, and only six being the crème de la crème (aka critical), it’s a light snack compared to last month’s buffet. But don’t get too comfy; those sneaky 0-days are lurking in the shadows, waiting to pounce!

Key Points:

  • 51 vulnerabilities in total, with six rated as critical.
  • Six 0-day vulnerabilities have already been exploited, none rated as critical.
  • Windows Domain Name Service has a critical, not-yet-exploited vulnerability (CVE-2025-24064).
  • Three exploited vulnerabilities affect NTFS file system; one allows remote code execution.
  • Critical vulnerabilities are found in Windows Remote Desktop Services and Microsoft Office.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?