For all users of Windows, Excel or Microsoft products, staying informed about the latest vulnerabilities is crucial to protect their systems and data.
Vulnerabilities are classified by the CVE vulnerabilities database. Mr.Benny aims to enrich it with DataCare+ tags, providing deeper context and practical recommendations. This ensures you’re not just aware of vulnerabilities but also understand the specific actions needed to address them.
Below is a curated list of recent Vulnerabilities and Exposures (CVEs) for Windows and Microsoft services, identified in January 2025, along with brief descriptions and references for each. Remember, keep your Windows and Excel updated.
RCE = Remote code execution
EoP = Escalation of privileges
CVE |
Title |
Severity |
CVSS Score |
Exploited |
Type |
Windows OLE Remote Code Execution Vulnerability |
Critical |
9.8 |
No |
RCE |
|
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability |
Critical |
9.8 |
No |
RCE |
|
Windows NTLM V1 Elevation of Privilege Vulnerability |
Critical |
9.8 |
No |
EoP |
|
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
Important |
7.8 |
Yes |
EoP |
|
Microsoft Excel Remote Code Execution Vulnerability |
Important |
7.8 |
No |
RCE |
|
Windows Remote Desktop Services Remote Code Execution Vulnerability |
Critical |
8.1 |
No |
RCE |
|
Microsoft Digest Authentication Remote Code Execution Vulnerability |
Critical |
8.1 |
No |
RCE |
Critical security vulnerability identified in Windows Object Linking and Embedding (OLE), a technology that allows embedding and linking to documents. CVSS score of 9.8 indicates high severity. It affects multiple versions of Windows, including Windows 10 and Windows Server editions.
CVE-2025-21298 is a remote code execution vulnerability within the UtOlePresStmToContentsStm function in ole32.dll. An attacker can exploit this flaw by sending a specially crafted email containing a malicious RTF attachment. When the victim opens or previews the email in Microsoft Outlook, the vulnerability is triggered, allowing the attacker to execute arbitrary code on the affected system without user interaction.
Microsoft has released security updates to address this vulnerability. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. Additionally, as a precautionary measure, configuring Outlook to read all standard mail in plain text format can help prevent exploitation
Critical security vulnerability in the Windows Reliable Multicast Transport Driver (RMCAST), which is responsible for implementing reliable multicast communication using the Pragmatic General Multicast (PGM) protocol. The vulnerability has a CVSS score of 9.8, indicating high severity. An unauthenticated, remote attacker can exploit this flaw by sending specially crafted packets to a Windows PGM open socket, leading to arbitrary code execution on the affected system. Successful exploitation requires a program that actively listens to a PGM port. (nvd.nist.gov)
Microsoft has released security updates to address this vulnerability. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. Additionally, as a precautionary measure, disabling the MSMQ service, if it is running and not required, can help prevent exploitation.(blog.qualys.com)
Critical elevation of privilege vulnerability affecting Windows NTLMv1 (NT LAN Manager version 1 - authentication protocol used primarily for network authentication on Windows-based systems). An unauthenticated, remote attacker can exploit this flaw by sending specially crafted authentication requests, leading to full system compromise. The vulnerability has a CVSS score of 9.8, indicating high severity.
crowdstrike.com
Microsoft has released security updates to address this vulnerability. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. The updates are available through the Microsoft Security Update Guide.
msrc.microsoft.com
In January 2025, multiple elevation of privilege vulnerabilities were identified in the Windows Hyper-V NT Kernel Integration Virtualization Service Provider (VSP). These vulnerabilities, tracked as CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335, could allow an authenticated attacker to execute arbitrary code with elevated privileges on the host system. The vulnerabilities have a CVSS score of 7.8, indicating high severity.
msrc.microsoft.com
Solution: Microsoft has released security updates to address this vulnerability. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. The updates are available through the Microsoft Security Update Guide.
msrc.microsoft.com
In January 2025, two critical remote code execution vulnerabilities were identified in Microsoft Excel:
Both vulnerabilities have been assigned a CVSS score of 8.4, indicating high severity. Exploitation can occur through the Preview Pane, as Excel processes part of the file to generate a preview, triggering the vulnerability without fully opening the file.
Microsoft has released security updates to address these vulnerabilities. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. The updates are available through the Microsoft Security Update Guide.
CVE-2025-21309 is a critical security vulnerability identified in Windows Remote Desktop Services. An unauthenticated, remote attacker can exploit this flaw by sending specially crafted requests to a target system's Remote Desktop Service, leading to remote code execution. This vulnerability has been assigned a CVSS score of 8.1, indicating high severity.
Microsoft has released security updates to address this vulnerability. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. The updates are available through the Microsoft Security Update Guide.
CVE-2025-21294 is a critical security vulnerability in Microsoft's Digest Authentication mechanism. An unauthenticated, remote attacker can exploit this flaw by sending specially crafted requests to a target system utilizing Digest Authentication, leading to remote code execution. This vulnerability has been assigned a CVSS score of 8.1, indicating high severity.
Microsoft has released security updates to address this vulnerability. Users and administrators are strongly advised to apply the latest patches provided by Microsoft to mitigate potential risks. The updates are available through the Microsoft Security Update Guide.
Staying on top of these Microsoft vulnerabilities is no easy feat, but it's crucial for maintaining a robust security posture. That's where Mr.Benny comes in.
Our smart assistant automates vulnerability scanning, prioritizes CVEs based on your specific environment, and provides actionable remediation guidance. Don't let these Microsoft vulnerabilities catch you off guard. Try Mr.Benny today and experience the power of proactive security management.