Microsoft patch tuesday corregge 134 vulnerabilità e zero-day sfruttato da RansomEXX

da Livio Varriale
0 commenti 11 minuti leggi
Microsoft Patch Tuesday

Aprile 2025 segna un aggiornamento critico per la sicurezza degli utenti Windows: Microsoft patch tuesday ha rilasciato un aggiornamento cumulativo che risolve ben 134 falle di sicurezza nei suoi sistemi operativi e software. Tra queste, una in particolare si è distinta per la sua pericolosità: si tratta della vulnerabilità CVE-2025-29824, già attivamente sfruttata da gruppi ransomware come RansomEXX.

Un aggiornamento Patch Tuesday tra i più importanti dell’anno

L’aggiornamento mensile, noto come Patch Tuesday, ha visto Microsoft impegnata nella risoluzione di un numero particolarmente alto di bug. Nello specifico, 63 vulnerabilità sono state classificate come critiche o di elevata severità. La più allarmante è CVE-2025-29824, un use-after-free nel Common Log File System (CLFS) che consente l’elevazione dei privilegi a livello SYSTEM.

Annunci

L’exploit non richiede l’interazione dell’utente, è semplice da implementare e sfrutta basse autorizzazioni per compromettere i sistemi target. Il gruppo ransomware RansomEXX, conosciuto anche come Storm-2460, ha utilizzato questo bug per veicolare un malware chiamato PipeMagic, che consente il controllo remoto del sistema, il furto di dati e la distribuzione di payload malevoli.

Obiettivi mirati e distribuzione geografica degli attacchi

Le organizzazioni colpite includono aziende del settore tecnologico negli Stati Uniti, istituzioni finanziarie in Venezuela, un’azienda di software spagnola, e attori del commercio al dettaglio in Arabia Saudita. Nonostante la gravità, Microsoft precisa che l’attacco è stato limitato a pochi casi.

Patch incomplete per Windows 10: aggiornamenti in arrivo

Mentre la falla è già stata risolta per la maggior parte delle versioni di Windows, gli utenti Windows 10 (sia 64-bit che 32-bit) dovranno attendere ulteriori aggiornamenti. Microsoft ha garantito che le patch mancanti verranno distribuite il prima possibile.

Aggiornamenti cumulativi per Windows 11 e 10: nuove build e correzioni

Contestualmente al Patch Tuesday, Microsoft ha rilasciato anche aggiornamenti KB5055523 e KB5055528 per Windows 11 e KB5055518 per Windows 10. Questi aggiornamenti portano nuove build, correggono bug noti e migliorano la sicurezza.

Su Windows 11 24H2, viene risolta un’importante vulnerabilità che provocava problemi di autenticazione in ambienti aziendali dove era attivo il Credential Guard con Kerberos PKINIT. L’errore impediva il corretto cambio delle password ogni 30 giorni, causando account disabilitati o bloccati. Sebbene il problema fosse circoscritto a scenari aziendali, Microsoft ha temporaneamente disabilitato gli account macchina nel Credential Guard fino al rilascio di una soluzione definitiva.

Stabilità migliorata nella stampa su Windows 10

L’aggiornamento KB5055518 per Windows 10 ha corretto un bug che causava caratteri casuali durante la stampa, un problema segnalato da diversi utenti nelle scorse settimane. Anche in questo caso, la build è stata aggiornata per includere le ultime patch di sicurezza.

Storico di vulnerabilità nel CLFS: un vettore sempre attivo

Questa non è la prima volta che la Common Log File System Driver viene sfruttata. Nel 2023, Microsoft ha già affrontato una vulnerabilità simile (CVE-2023-28252) utilizzata per attacchi ransomware. Anche in quel caso, era coinvolto il malware PipeMagic, scoperto inizialmente da Kaspersky durante un’indagine su attacchi Nokoyawa.

Evoluzione di RansomEXX: da Defray a minaccia globale

Il gruppo RansomEXX, attivo dal 2018 con il nome Defray, ha acquisito visibilità a partire dal 2020. Da allora ha colpito importanti organizzazioni, tra cui Gigabyte, Konica Minolta, il Dipartimento dei trasporti del Texas (TxDOT), il sistema giudiziario brasiliano, il trasporto pubblico di Montréal, e il fornitore governativo Tyler Technologies.

Reazione consigliata: aggiornare immediatamente i sistemi

Microsoft ha raccomandato a tutti gli utenti, specialmente quelli in ambito enterprise, di installare immediatamente le patch di aprile 2025. Gli utenti di Windows 11 24H2 sono meno esposti, ma non completamente immuni. Per i sistemi ancora sprovvisti delle patch (in particolare Windows 10), è cruciale limitare i privilegi degli utenti e monitorare eventuali anomalie nei log di sistema.

Un’azione coordinata contro un vettore noto e ancora sfruttato

La gravità della vulnerabilità e l’evidenza di un suo sfruttamento attivo da parte di un gruppo strutturato confermano la necessità di strategie proattive di aggiornamento, soprattutto in contesti aziendali. La persistenza di vettori noti come CLFS richiede interventi continui, sia tecnici che educativi, da parte dei reparti IT e delle aziende di sicurezza.

Ecco la lista completa delle vulnerabilità risolte:

TagCVE IDCVE TitleSeverity
Active Directory Domain ServicesCVE-2025-29810Active Directory Domain Services Elevation of Privilege VulnerabilityImportant
ASP.NET CoreCVE-2025-26682ASP.NET Core and Visual Studio Denial of Service VulnerabilityImportant
Azure LocalCVE-2025-27489Azure Local Elevation of Privilege VulnerabilityImportant
Azure Local ClusterCVE-2025-26628Azure Local Cluster Information Disclosure VulnerabilityImportant
Azure Local ClusterCVE-2025-25002Azure Local Cluster Information Disclosure VulnerabilityImportant
Azure Portal Windows Admin CenterCVE-2025-29819Windows Admin Center in Azure Portal Information Disclosure VulnerabilityImportant
Dynamics Business CentralCVE-2025-29821Microsoft Dynamics Business Central Information Disclosure VulnerabilityImportant
Microsoft AutoUpdate (MAU)CVE-2025-29800Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityImportant
Microsoft AutoUpdate (MAU)CVE-2025-29801Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-3073Chromium: CVE-2025-3073 Inappropriate implementation in AutofillUnknown
Microsoft Edge (Chromium-based)CVE-2025-3068Chromium: CVE-2025-3068 Inappropriate implementation in IntentsUnknown
Microsoft Edge (Chromium-based)CVE-2025-3074Chromium: CVE-2025-3074 Inappropriate implementation in DownloadsUnknown
Microsoft Edge (Chromium-based)CVE-2025-3067Chromium: CVE-2025-3067 Inappropriate implementation in Custom TabsUnknown
Microsoft Edge (Chromium-based)CVE-2025-3071Chromium: CVE-2025-3071 Inappropriate implementation in NavigationsUnknown
Microsoft Edge (Chromium-based)CVE-2025-3072Chromium: CVE-2025-3072 Inappropriate implementation in Custom TabsUnknown
Microsoft Edge (Chromium-based)CVE-2025-3070Chromium: CVE-2025-3070 Insufficient validation of untrusted input in ExtensionsUnknown
Microsoft Edge (Chromium-based)CVE-2025-3069Chromium: CVE-2025-3069 Inappropriate implementation in ExtensionsUnknown
Microsoft Edge (Chromium-based)CVE-2025-25000Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-29815Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-25001Microsoft Edge for iOS Spoofing VulnerabilityLow
Microsoft Edge (Chromium-based)CVE-2025-3066Chromium: CVE-2025-3066 Use after free in NavigationsUnknown
Microsoft Edge for iOSCVE-2025-29796Microsoft Edge for iOS Spoofing VulnerabilityLow
Microsoft OfficeCVE-2025-27745Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-27744Microsoft Office Elevation of Privilege VulnerabilityImportant
Microsoft OfficeCVE-2025-26642Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-29792Microsoft Office Elevation of Privilege VulnerabilityImportant
Microsoft OfficeCVE-2025-29791Microsoft Excel Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-27748Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-27746Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-27749Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-27751Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-27750Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-29823Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-27752Microsoft Excel Remote Code Execution VulnerabilityCritical
Microsoft Office OneNoteCVE-2025-29822Microsoft OneNote Security Feature Bypass VulnerabilityImportant
Microsoft Office SharePointCVE-2025-29794Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-29793Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-27747Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-29816Microsoft Word Security Feature Bypass VulnerabilityImportant
Microsoft Office WordCVE-2025-29820Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Streaming ServiceCVE-2025-27471Microsoft Streaming Service Denial of Service VulnerabilityImportant
Microsoft Virtual Hard DriveCVE-2025-26688Microsoft Virtual Hard Disk Elevation of Privilege VulnerabilityImportant
OpenSSH for WindowsCVE-2025-27731Microsoft OpenSSH for Windows Elevation of Privilege VulnerabilityImportant
Outlook for AndroidCVE-2025-29805Outlook for Android Information Disclosure VulnerabilityImportant
Remote Desktop ClientCVE-2025-27487Remote Desktop Client Remote Code Execution VulnerabilityImportant
Remote Desktop Gateway ServiceCVE-2025-27482Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Remote Desktop Gateway ServiceCVE-2025-27480Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
RPC Endpoint Mapper ServiceCVE-2025-26679RPC Endpoint Mapper Service Elevation of Privilege VulnerabilityImportant
System CenterCVE-2025-27743Microsoft System Center Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-29802Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-29804Visual Studio Elevation of Privilege VulnerabilityImportant
Visual Studio CodeCVE-2025-20570Visual Studio Code Elevation of Privilege VulnerabilityImportant
Visual Studio Tools for Applications and SQL Server Management StudioCVE-2025-29803Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege VulnerabilityImportant
Windows Active Directory Certificate ServicesCVE-2025-27740Active Directory Certificate Services Elevation of Privilege VulnerabilityImportant
Windows BitLockerCVE-2025-26637BitLocker Security Feature Bypass VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-27490Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2025-29824Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cryptographic ServicesCVE-2025-29808Windows Cryptographic Services Information Disclosure VulnerabilityImportant
Windows Cryptographic ServicesCVE-2025-26641Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityImportant
Windows Defender Application Control (WDAC)CVE-2025-26678Windows Defender Application Control Security Feature Bypass VulnerabilityImportant
Windows Digital MediaCVE-2025-27730Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-27467Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-26640Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-27476Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-24074Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-24073Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-24058Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-24062Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-24060Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows HelloCVE-2025-26635Windows Hello Security Feature Bypass VulnerabilityImportant
Windows HelloCVE-2025-26644Windows Hello Spoofing VulnerabilityImportant
Windows HTTP.sysCVE-2025-27473HTTP.sys Denial of Service VulnerabilityImportant
Windows Hyper-VCVE-2025-27491Windows Hyper-V Remote Code Execution VulnerabilityCritical
Windows InstallerCVE-2025-27727Windows Installer Elevation of Privilege VulnerabilityImportant
Windows KerberosCVE-2025-26647Windows Kerberos Elevation of Privilege VulnerabilityImportant
Windows KerberosCVE-2025-27479Kerberos Key Distribution Proxy Service Denial of Service VulnerabilityImportant
Windows KerberosCVE-2025-29809Windows Kerberos Security Feature Bypass VulnerabilityImportant
Windows KernelCVE-2025-26648Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-27739Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows Kernel MemoryCVE-2025-29812DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
Windows Kernel-Mode DriversCVE-2025-27728Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportant
Windows LDAP – Lightweight Directory Access ProtocolCVE-2025-26673Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportant
Windows LDAP – Lightweight Directory Access ProtocolCVE-2025-26663Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityCritical
Windows LDAP – Lightweight Directory Access ProtocolCVE-2025-27469Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportant
Windows LDAP – Lightweight Directory Access ProtocolCVE-2025-26670Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution VulnerabilityCritical
Windows Local Security Authority (LSA)CVE-2025-21191Windows Local Security Authority (LSA) Elevation of Privilege VulnerabilityImportant
Windows Local Security Authority (LSA)CVE-2025-27478Windows Local Security Authority (LSA) Elevation of Privilege VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-26651Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Mark of the Web (MOTW)CVE-2025-27472Windows Mark of the Web Security Feature Bypass VulnerabilityImportant
Windows MediaCVE-2025-26666Windows Media Remote Code Execution VulnerabilityImportant
Windows MediaCVE-2025-26674Windows Media Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2025-29811Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-27742NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-21197Windows NTFS Information Disclosure VulnerabilityImportant
Windows NTFSCVE-2025-27741NTFS Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-27483NTFS Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-27733NTFS Elevation of Privilege VulnerabilityImportant
Windows Power Dependency CoordinatorCVE-2025-27736Windows Power Dependency Coordinator Information Disclosure VulnerabilityImportant
Windows Remote Desktop ServicesCVE-2025-26671Windows Remote Desktop Services Remote Code Execution VulnerabilityImportant
Windows Resilient File System (ReFS)CVE-2025-27738Windows Resilient File System (ReFS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-27474Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-21203Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-26668Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-26667Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-26664Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-26672Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-26669Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-26676Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Secure ChannelCVE-2025-27492Windows Secure Channel Elevation of Privilege VulnerabilityImportant
Windows Secure ChannelCVE-2025-26649Windows Secure Channel Elevation of Privilege VulnerabilityImportant
Windows Security Zone MappingCVE-2025-27737Windows Security Zone Mapping Security Feature Bypass VulnerabilityImportant
Windows ShellCVE-2025-27729Windows Shell Remote Code Execution VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-27485Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-27486Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-21174Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-26680Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-27470Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-26652Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Subsystem for LinuxCVE-2025-26675Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows TCP/IPCVE-2025-26686Windows TCP/IP Remote Code Execution VulnerabilityCritical
Windows Telephony ServiceCVE-2025-27481Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2025-21222Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2025-21205Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2025-21221Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2025-27477Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Universal Plug and Play (UPnP) Device HostCVE-2025-27484Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege VulnerabilityImportant
Windows Update StackCVE-2025-21204Windows Process Activation Elevation of Privilege VulnerabilityImportant
Windows Update StackCVE-2025-27475Windows Update Stack Elevation of Privilege VulnerabilityImportant
Windows upnphost.dllCVE-2025-26665Windows upnphost.dll Elevation of Privilege VulnerabilityImportant
Windows USB Print DriverCVE-2025-26639Windows USB Print Driver Elevation of Privilege VulnerabilityImportant
Windows Virtualization-Based Security (VBS) EnclaveCVE-2025-27735Windows Virtualization-Based Security (VBS) Security Feature Bypass VulnerabilityImportant
Windows Win32K – GRFXCVE-2025-27732Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Windows Win32K – GRFXCVE-2025-26687Win32k Elevation of Privilege VulnerabilityImportant
Windows Win32K – GRFXCVE-2025-26681Win32k Elevation of Privilege VulnerabilityImportant

Si può anche come

MatriceDigitale.it – Copyright © 2024, Livio Varriale – Registrazione Tribunale di Napoli n° 60 del 18/11/2021. – P.IVA IT10498911212 Privacy Policy e Cookies

Developed with love by Giuseppe Ferrara