1.0 Introduction
Recently, Microsoft has released advisory to address multiple vulnerabilities in its products.
2.0 Impact
These vulnerabilities could allow attackers to delete targeted files, potentially disrupting services, gain SYSTEM privileges on affected Windows systems, bypass UEFI and compromised the secure kernel on certain hardware, expose Windows user NTLM hashes, potentially allowing remote attackers to impersonate users, remote code execution on systems running HPC Pack, potentially giving control over these systems, execute arbitrary code, execute code remotely via crafted Excel files.
3.0 Affected Products
- CVE-2025-21391: Windows Storage Elevation of Privileges Vulnerability
- CVE-2025-21418: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
- CVE-2025-21194: Microsoft Surface Security Feature Bypass Vulnerability
- CVE-2025-21377: NTLM Hash Disclosure Spoofing Vulnerability
- CVE-2025-21198: Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability
- CVE-2025-21376: Windows LDAP Remote Code Execution Vulnerability
- CVE-2025-21381: Microsoft Excel Remote Code Execution Vulnerability
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the
Microsoft MSRC Security Update Guide
and apply the necessary updates.
Kindly refer to the following URL:
Generally, we advise users to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 Incident Response Centre through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:3the 0 MYT
Web:
https://www.mycert.org.my
5.0 References