Virtual Administrator’s March 2025 Patch Recommendations

All new patches will be approved in our patch policy.
March brings a modest 56 security updates but with 6 actively exploited zero-day vulnerabilities.
Notably all 6 are rated as “Important” by Microsoft which generally means exploitation requires some user interaction.
- CVE-2025-24991 and CVE-2025-24993 are both vulnerabilities in NTFS and the attacker need to dupe the end user into mounting a malicious virtual hard disk.
- CVE-2025-24985 is a remote code execution vulnerability in the Windows Fast FAT File System Driver and also requires the end user to mount a virtual hard disk.
- CVE-2025-26633 is a security feature bypass vulnerability in the Microsoft Management Console (MMC).
- CVE-2025-24983 is an elevation of privilege vulnerability in the Win32 kernel subsystem.
- CVE-2025-24984 is a Windows NTFS information disclosure vulnerabilities but an “attacker needs physical access to the target computer to plug in a malicious USB drive.”
- New Microsoft Security Advisory ADV236618.
- Also a few new SSUs for Windows Server 2016 and Windows 10 versions 1507.
Last month’s issue with the System Guard Runtime Monitor Broker Service (SgrmBroker.exe) has not been fixed. If your USB printer starts printing random text, or you can’t download Roblox, see “known Issues” below.
Disclosed: CVE-2025-26630
Exploited: CVE-2025-24983, CVE-2025-24984, CVE-2025-24985, CVE-2025-24991, CVE-2025-24993, CVE-2025-26633
Security Update Guide
https://msrc.microsoft.com/update-guide/en-us
Microsoft Security Advisories
ADV990001 | Latest Servicing Stack Updates (Published:11/13/2018 | Last Updated:3/11/2025)
https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001
Reason for Revision: A Servicing Stack Update has been released for some versions of Windows.
NOTE: The Windows 10/11 Security Stack Updates are included in the monthly Cumulative Updates.
ADV236618 | AMD-SB-7033 AMD CPU Microcode Signature Verification Vulnerability
https://msrc.microsoft.com/update-guide/advisory/ADV236618
Microsoft is aware of AMD-SB-7033/CVE-2024-36347 disclosed by AMD on March 5, 2025. Microsoft is not aware of any active attacks leveraging this vulnerability.
This vulnerability requires local administrator privileges to load malicious microcode. Mitigations are in place across all Microsoft cloud services. As a result, Microsoft cloud customers are already protected and no customer action is required.
Known Issues
USB printers might print random text and Roblox download issues.
Microsoft continues to list unresolved older problems under the Known Issues for new patches. So if you have not yet experienced one of these issues it is unlikely it will occur now.
“USB printers might print random text with the January 2025 preview update.”
Affected platforms: Windows 10 21H2/22H2 and Windows 11 22H2/23H2
Symptom: After installing this update, you might observe issues with USB connected dual-mode printers that support both USB Print and IPP Over USB protocols. You might observe that the printer unexpectedly prints random text and data, including network commands and unusual characters. Resulting from this issue, the printed text might often start with the header “POST /ipp/print HTTP/1.1”, followed by other IPP (Internet Printing Protocol) related headers. This issue tends to occur more often when the printer is either powered on or reconnected to the device after being disconnected.
Workaround: This issue is mitigated using Known Issue Rollback (KIR). IT administrators can mitigate this issue by following the steps mentioned in the Resolution section of this known issue in Windows release health site.
https://learn.microsoft.com/en-us/windows/release-health/status-windows-11-22h2#3495msgdesc
Status: We are working on a final resolution that will be part of a future Windows update.
“Roblox from the Microsoft Store on Windows fails to download.”
Affected platforms: Windows 11 24H2
Symptom: We’re aware of an issue where players on Arm devices are unable to download and play Roblox from the Microsoft Store on Windows.
Workaround: Roblox is working on a resolution to address this issue. Please refer to the Roblox support site for updates. Until the resolution is available, players on Arm devices can play Roblox by downloading the title directly from www.Roblox.com.
Good resource for known issues with Windows 10/11 patches. Find the version and click on “Known issues”.
Windows release health
https://docs.microsoft.com/en-us/windows/release-health/
Monthly Rollup/Security Only/Windows 10,11/Server 2016,2019,2022,2025 KBs
Links are https://support.microsoft.com/en-us/help/####### with the KB number only.
Security and Quality Rollup
- KB5053887 – Windows Server 2012 R2 (ESU)
- KB5053886 – Windows Server 2012 (ESU)
Cumulative Updates
Windows 10
- KB5053618 – Original release version 1507 (OS Build 10240)
- KB5053594 – Version 1607 “Anniversary Update” (OS Build 14393)
- KB5053596 – Version 1809 “October 2018 Update” (OS Build 17763)
- KB5053606 – Version 21H2 “November 2021 Update” (OS Build 19044)
- KB5053606 – Version 22H2 “November 2022 Update” (OS Build 19045)
(Versions 1511,1703,1709,1803,1903,1909,2004,20H2,21H1 are no longer under support)
Windows 11
- KB5053602 – 22H2 (OS Build 22621)
- KB5053602 – 23H2 (OS Build 22631)
- KB5053598 – 24H2 (OS Build 26100)
(Version 21H2 is no longer under support)
Windows Server
- KB5053594 – Server 2016 (same KB as Windows 10 Version 1607)
- KB5053596 – Server 2019 (same KB as Windows 10 Version 1809)
- KB5053603 – Server 2022 (OS Build 20348)
- KB5053599 – Server 23H2 (OS Build 25398)
- KB5053598 – Server 2025 (OS Build 26100)
March 2025 updates for Microsoft Office
Notable CVEs
CVE-2025-24035 | Windows Remote Desktop Services Remote Code Execution Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24035
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
CVE-2025-24045 | Windows Remote Desktop Services Remote Code Execution Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24045
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
CVE-2025-24983 | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24983
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
CVE-2025-24984 | Windows NTFS Information Disclosure Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24984
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
CVE-2025-24985 | Windows Fast FAT File System Driver Remote Code Execution Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24985
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
CVE-2025-24991 | Windows NTFS Information Disclosure Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24991
Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
CVE-2025-24993 | Windows NTFS Remote Code Execution Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24993
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
CVE-2025-26633 | Microsoft Management Console Security Feature Bypass Vulnerability (Cumulative Update/Monthly Rollup)
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26633
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.