Microsoft has released its February 2025 security update package, addressing 63 vulnerabilities across its product ecosystem. Of particular concern are four zero-day vulnerabilities, with two already being actively exploited in the wild, presenting immediate security risks to organizations and users worldwide.
Critical Zero-Day Vulnerabilities Under Active Exploitation
The most pressing security threat comes from CVE-2025-21391, a Windows Storage vulnerability with a CVSS score of 7.1. This flaw enables attackers to delete specific system files, potentially causing significant service disruptions. While this vulnerability doesn’t directly lead to data theft, its potential impact on system availability poses a substantial threat to business operations and service continuity.
Another actively exploited vulnerability, CVE-2025-21418, affects the Windows AFD.sys driver and carries a CVSS score of 7.8. This security flaw enables privilege escalation to SYSTEM level, effectively granting attackers complete control over compromised systems. The combination of active exploitation and elevated privileges makes this vulnerability particularly dangerous for enterprise environments.
Publicly Disclosed Zero-Day Vulnerabilities
Two additional zero-day vulnerabilities have been publicly disclosed prior to patch release. CVE-2025-21194 targets Microsoft Surface devices, potentially compromising UEFI security mechanisms and affecting both hypervisor and kernel integrity. This vulnerability appears to be connected to the recently discovered PixieFail IPv6 implementation flaws, highlighting the interconnected nature of modern security challenges.
The second disclosed vulnerability, CVE-2025-21377, enables NTLM hash exposure through minimal user interaction with malicious files. This authentication bypass vulnerability could allow attackers to gain unauthorized system access using compromised user credentials, presenting a significant risk to organizational security.
High-Impact Remote Code Execution Vulnerabilities
Among the most severe issues addressed is CVE-2025-21198, a critical vulnerability in High Performance Compute with a CVSS score of 9.0. This flaw enables remote code execution across HPC clusters, potentially creating a cascade effect that could compromise entire computing infrastructures. While initial network access is required, the potential for lateral movement makes this vulnerability particularly concerning for organizations operating HPC environments.
The update also patches CVE-2025-21376, an LDAP protocol vulnerability with a CVSS score of 8.1, which could enable remote code execution through race condition exploitation. Security administrators are strongly advised to prioritize the deployment of these patches to protect against potential enterprise-wide compromises.
Organizations should immediately implement these security updates across their infrastructure to mitigate these significant security risks. The presence of actively exploited zero-day vulnerabilities, combined with the critical nature of the remote code execution flaws, makes this February update particularly crucial for maintaining robust security postures. Security teams should also conduct thorough system audits to ensure complete patch deployment and monitor for any signs of exploitation attempts.