Key Takeaways:
Microsoft has rolled out the March 2025 Patch Tuesday updates for Windows 11 and Windows 10, addressing critical security threats. This month’s release patches six zero-day vulnerabilities impacting key services, including Windows, Office, Azure, .NET, Visual Studio, Remote Desktop Services, DNS Server, and Hyper-V Server.
This update introduces new features and improvements for Windows 11 users on versions 24H2, 23H2, and 22H2. It includes minor enhancements to File Explorer, Narrator, and Windows Spotlight for a smoother user experience.
As pointed out by Zero Day Initiative, the March 2025 Patch Tuesday Updates fix a total of 67 vulnerabilities, with six of them rated Critical, and 50 are rated Important in severity. Here are the most critical vulnerabilities fixed with this month’s Patch Tuesday updates:
You can find the full list of CVEs included in this month’s Patch Tuesday below:
Product | Impact | Max Severity | Article | Download | Details |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5052006 | Security Update | CVE-2025-26634 |
Windows Server 2016 | Elevation of Privilege | Important | 5052006 | Security Update | CVE-2025-26634 |
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5052006 | Security Update | CVE-2025-26634 |
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5052006 | Security Update | CVE-2025-26634 |
Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5052040 | Security Update | CVE-2025-26634 |
Windows 10 for 32-bit Systems | Elevation of Privilege | Important | 5052040 | Security Update | CVE-2025-26634 |
Windows Server 2025 | Elevation of Privilege | Important | 5051987 | Security Update | CVE-2025-26634 |
Windows 11 Version 24H2 for x64-based Systems | Elevation of Privilege | Important | 5051987 | Security Update | CVE-2025-26634 |
Windows 11 Version 24H2 for ARM64-based Systems | Elevation of Privilege | Important | 5051987 | Security Update | CVE-2025-26634 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Elevation of Privilege | Important | 5051980 | Security Update | CVE-2025-26634 |
Windows 11 Version 23H2 for x64-based Systems | Elevation of Privilege | Important | 5051989 | Security Update | CVE-2025-26634 |
Windows 11 Version 23H2 for ARM64-based Systems | Elevation of Privilege | Important | 5051989 | Security Update | CVE-2025-26634 |
Windows Server 2025 (Server Core installation) | Elevation of Privilege | Important | 5051987 | Security Update | CVE-2025-26634 |
Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5051974 | Security Update | CVE-2025-26634 |
Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5051974 | Security Update | CVE-2025-26634 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5051974 | Security Update | CVE-2025-26634 |
Windows 11 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5051989 | Security Update | CVE-2025-26634 |
Windows 11 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5051989 | Security Update | CVE-2025-26634 |
Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5051974 | Security Update | CVE-2025-26634 |
Windows 10 Version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5051974 | Security Update | CVE-2025-26634 |
Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5051974 | Security Update | CVE-2025-26634 |
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5051979 | Security Update | CVE-2025-26634 |
Windows Server 2022 | Elevation of Privilege | Important | 5051979 | Security Update | CVE-2025-26634 |
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5052000 | Security Update | CVE-2025-26634 |
Windows Server 2019 | Elevation of Privilege | Important | 5052000 | Security Update | CVE-2025-26634 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5052000 | Security Update | CVE-2025-26634 |
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5052000 | Security Update | CVE-2025-26634 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Critical | 5053596 | Security Update | CVE-2025-26645 |
Windows Server 2019 | Remote Code Execution | Critical | 5053596 | Security Update | CVE-2025-26645 |
Windows 10 Version 1809 for x64-based Systems | Remote Code Execution | Critical | 5053596 | Security Update | CVE-2025-26645 |
Windows 10 Version 1809 for 32-bit Systems | Remote Code Execution | Critical | 5053596 | Security Update | CVE-2025-26645 |
Windows App Client for Windows Desktop | Remote Code Execution | Critical | Release Notes | Security Update | CVE-2025-26645 |
Windows Server 2012 R2 (Server Core installation) | Security Feature Bypass | Important | 5053887 | Monthly Rollup | CVE-2025-26633 |
Windows Server 2012 R2 | Security Feature Bypass | Important | 5053887 | Monthly Rollup | CVE-2025-26633 |
Windows Server 2012 (Server Core installation) | Security Feature Bypass | Important | 5053886 | Monthly Rollup | CVE-2025-26633 |
Windows Server 2012 | Security Feature Bypass | Important | 5053886 | Monthly Rollup | CVE-2025-26633 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Information Disclosure | Important | 5053620 | Monthly Rollup | CVE-2025-24992 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Information Disclosure | Important | 5053627 | Security Only | CVE-2025-24992 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Information Disclosure | Important | 5053620 | Monthly Rollup | CVE-2025-24992 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Information Disclosure | Important | 5053627 | Security Only | CVE-2025-24992 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5053888 | Monthly Rollup | CVE-2025-24992 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5053995 | Security Only | CVE-2025-24992 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Information Disclosure | Important | 5053888 | Monthly Rollup | CVE-2025-24992 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Information Disclosure | Important | 5053995 | Security Only | CVE-2025-24992 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5053888 | Monthly Rollup | CVE-2025-24992 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5053995 | Security Only | CVE-2025-24992 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5053594 | Security Update | CVE-2025-24983 |
Windows Server 2016 | Elevation of Privilege | Important | 5053594 | Security Update | CVE-2025-24983 |
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5053594 | Security Update | CVE-2025-24983 |
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5053594 | Security Update | CVE-2025-24983 |
Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5053618 | Security Update | CVE-2025-24983 |
Windows 10 for 32-bit Systems | Elevation of Privilege | Important | 5053618 | Security Update | CVE-2025-24983 |
Windows Server 2025 | Remote Code Execution | Critical | 5053598 | Security Update | CVE-2025-24084 |
Windows Server 2025 | Remote Code Execution | Critical | 5053636 | SecurityHotpatchUpdate | CVE-2025-24084 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Critical | 5053598 | Security Update | CVE-2025-24084 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Critical | 5053636 | SecurityHotpatchUpdate | CVE-2025-24084 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Critical | 5053598 | Security Update | CVE-2025-24084 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Critical | 5053636 | SecurityHotpatchUpdate | CVE-2025-24084 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Critical | 5053599 | Security Update | CVE-2025-24084 |
Windows Server 2022 | Spoofing | Important | 5053603 | Security Update | CVE-2025-24071 |
Windows Server 2022 | Spoofing | Important | 5053638 | SecurityHotpatchUpdate | CVE-2025-24071 |
Windows 11 Version 23H2 for ARM64-based Systems | Information Disclosure | Important | 5053602 | Security Update | CVE-2025-24055 |
Windows Server 2025 (Server Core installation) | Information Disclosure | Important | 5053598 | Security Update | CVE-2025-24055 |
Windows Server 2025 (Server Core installation) | Information Disclosure | Important | 5053636 | SecurityHotpatchUpdate | CVE-2025-24055 |
Windows 10 Version 22H2 for 32-bit Systems | Information Disclosure | Important | 5053606 | Security Update | CVE-2025-24055 |
Windows 10 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5053606 | Security Update | CVE-2025-24055 |
Windows 10 Version 22H2 for x64-based Systems | Information Disclosure | Important | 5053606 | Security Update | CVE-2025-24055 |
Windows 11 Version 22H2 for x64-based Systems | Information Disclosure | Important | 5053602 | Security Update | CVE-2025-24055 |
Windows 11 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5053602 | Security Update | CVE-2025-24055 |
Windows 10 Version 21H2 for x64-based Systems | Information Disclosure | Important | 5053606 | Security Update | CVE-2025-24055 |
Windows 10 Version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5053606 | Security Update | CVE-2025-24055 |
Windows 10 Version 21H2 for 32-bit Systems | Information Disclosure | Important | 5053606 | Security Update | CVE-2025-24055 |
Windows Server 2022 (Server Core installation) | Information Disclosure | Important | 5053603 | Security Update | CVE-2025-24055 |
Windows Server 2022 (Server Core installation) | Information Disclosure | Important | 5053638 | SecurityHotpatchUpdate | CVE-2025-24055 |
Microsoft Office LTSC for Mac 2024 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-24083 |
Microsoft Office LTSC 2024 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-24083 |
Microsoft Office LTSC 2024 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-24083 |
Microsoft Office LTSC 2021 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-24083 |
Microsoft Office LTSC 2021 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-24083 |
Microsoft Office LTSC for Mac 2021 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-24083 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Critical | 5053888 | Monthly Rollup | CVE-2025-26645 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Critical | 5053995 | Security Only | CVE-2025-26645 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Critical | 5053602 | Security Update | CVE-2025-26645 |
Remote Desktop client for Windows Desktop | Remote Code Execution | Critical | Release Notes | Security Update | CVE-2025-26645 |
Visual Studio Code | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-26631 |
Microsoft Access 2016 (64-bit edition) | Remote Code Execution | Important | 5002697 | Security Update | CVE-2025-26630 |
Microsoft Access 2016 (32-bit edition) | Remote Code Execution | Important | 5002697 | Security Update | CVE-2025-26630 |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-26630 |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-26630 |
Microsoft Office 2019 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-26630 |
Microsoft Office 2019 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-26630 |
Azure ARC | Elevation of Privilege | Important | What’s new | Security Update | CVE-2025-26627 |
Azure CLI | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-24049 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002696 | Security Update | CVE-2025-24075 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002696 | Security Update | CVE-2025-24075 |
Office Online Server | Remote Code Execution | Important | 5002690 | Security Update | CVE-2025-24075 |
Azure Agent for Backup | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-21199 |
Azure Agent for Site Recovery | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-21199 |
Windows Server 2012 R2 (Server Core installation) | Security Feature Bypass | Important | 5053593 | IE Cumulative | CVE-2025-21247 |
Windows Server 2012 R2 | Security Feature Bypass | Important | 5053593 | IE Cumulative | CVE-2025-21247 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Security Feature Bypass | Important | 5053593 | IE Cumulative | CVE-2025-21247 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Security Feature Bypass | Important | 5053593 | IE Cumulative | CVE-2025-21247 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Security Feature Bypass | Important | 5053593 | IE Cumulative | CVE-2025-21247 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Security Feature Bypass | Important | 5053593 | IE Cumulative | CVE-2025-21247 |
Microsoft Visual Studio 2022 version 17.13 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-25003 |
Microsoft Visual Studio 2022 version 17.12 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-25003 |
Microsoft Visual Studio 2022 version 17.10 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-25003 |
Microsoft Visual Studio 2022 version 17.8 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-25003 |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 – 16.10) | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-25003 |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 – 15.8) | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-24998 |
Azure promptflow-tools | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-24986 |
Azure promptflow-core | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-24986 |
Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Important | 5002693 | Security Update | CVE-2025-24083 |
Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Important | 5002693 | Security Update | CVE-2025-24083 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002694 | Security Update | CVE-2025-24081 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002694 | Security Update | CVE-2025-24081 |
Microsoft Word 2016 (64-bit edition) | Remote Code Execution | Important | 5002662 | Security Update | CVE-2025-24079 |
Microsoft Word 2016 (32-bit edition) | Remote Code Execution | Important | 5002662 | Security Update | CVE-2025-24079 |
ASP.NET Core 9.0 | Elevation of Privilege | Important | 5054230 | Security Update | CVE-2025-24070 |
ASP.NET Core 8.0 | Elevation of Privilege | Important | 5054229 | Security Update | CVE-2025-24070 |
WinDbg | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-24043 |
Microsoft released the KB5053598 and KB5053602 updates for users running Windows 11 version 24H2 as well as Windows 11 versions 23H2 and 22H2, respectively. This release brings a couple of new capabilities for all supported versions of the operating system, including a new multi-app camera feature.
There is also a new home page with cards that allow users to view device information and accessibility features available on managed PCs. Commercial customers can also access a card showing details of all Microsoft account types in use, but this feature is exclusive to Windows 11 version 22H2 Enterprise and Education editions.
Additionally, Microsoft released the KB5053606 patch for Windows 10 version 22H2. This update brings security fixes and improvements for Windows 10 devices. However, users who have certain Citrix components installed might be unable to install the January 2025 Windows security update on their machines.
Microsoft advises organizations to conduct comprehensive testing before deploying monthly patches in production environments. This is crucial as it helps to ensure that the updates do not cause any unexpected issues or disruptions to the systems. However, IT administrators should not delay deployment to the extent that it exposes the organization to increased risk.
A recommended best practice is to back up systems before applying updates to minimize unexpected post-update issues. This approach helps enterprise customers to ensure minimal downtime and disruption to critical operations.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.