{"id":62615,"date":"2025-01-30T11:16:53","date_gmt":"2025-01-30T11:16:53","guid":{"rendered":"https:\/\/www.n-able.com\/?p=62615"},"modified":"2025-01-30T11:16:53","modified_gmt":"2025-01-30T11:16:53","slug":"patch-tuesday-january-2025","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025","title":{"rendered":"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10"},"content":{"rendered":"<p><span>The January 2025 updates from Microsoft brings fixes for a large number of vulnerabilities, including three zero-day vulnerabilities that are Under Active Exploitation that affect Windows Hyper-V, and five more Publicly Disclosed zero-days that are marked as Exploitation Less Likely, but should still receive attention via mitigation through patching and additional mitigation measures. Microsoft is also forcing <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/getting-started-with-the-new-outlook-for-windows-656bb8d9-5a60-49b2-a98b-ba7822bc7627\" target=\"_blank\" rel=\"noopener\">New Outlook<\/a> to Windows 10 devices enrolled in preview updates, which will require the attention of MSPs that don\u2019t want to see their helpdesk queues backup with user complaints about unfamiliarity with a new version of Outlook suddenly appearing. <\/span><\/p>\n<h1><span>Microsoft Vulnerabilities <\/span><\/h1>\n<p><span>A total of 159 vulnerabilities were addressed with fixes for January\u2019s Patch Tuesday, including the above zero-days, as well as fixes that improve Windows 10 22H2 and Windows 10 21H2 resiliency against <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftsecurityexperts\/strategies-to-monitor-and-prevent-vulnerable-driver-attacks\/4103985\" target=\"_blank\" rel=\"noopener\">Bring Your Own Vulnerable Driver (BYOVD)<\/a> attacks. On top of this, there are also fixes for 17 vulnerabilities marked as Exploitation More Likely, so you will need to make sure you factor these into your planning for this month\u2019s patching. As always make sure you consider temporal elements such as likelihood of exploitation to ensure proper risk management. <\/span><\/p>\n<p><span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21333\" target=\"_blank\" rel=\"noopener\">CVE-2025-21333<\/a>, <a href=\"CVE-2025-21334\" target=\"_blank\" rel=\"noopener\">CVE-2025-21334<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21335\" target=\"_blank\" rel=\"noopener\">CVE-2025-21335<\/a> are the three zero-days Under Active Exploitation that all involve Windows Hyper-V. They are all privilege escalation vulnerabilities and are of note for IT admins and MSPs as these vulnerabilities don\u2019t affect just servers running the Hyper-V role, they also affect Windows 10 and Windows 11. Hyper-V has become the modern Windows OS equivalent of Internet Explorer; deeply embedded in systems and used for things you would never expect it to be a part of, and that keeps poking it\u2019s head up where you least expect it in vulnerability reports. As zero-days Under Exploitation and with a wide install base of affected Windows 10 and Windows 11 devices, you should put these at the top of your priority list. <\/span><\/p>\n<p><span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21186\" target=\"_blank\" rel=\"noopener\">CVE-2025-21186<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21366\" target=\"_blank\" rel=\"noopener\">CVE-2025-21366<\/a> is a remote code execution vulnerability affecting Microsoft Office 2016, 2019, 2021, 2024, Microsoft 365 Apps and Microsoft Access 2016 through the use of modified Microsoft Access documents. Microsoft guidance to address these vulnerabilities is to apply security updates through normal patching and Microsoft Office\u2019s Click to Run update mechanism. In addition, you may consider adding the following file extensions to your email filter solution to reduce chances for exposure, and to gain some breathing room to ensure all affected devices are updated:<\/span><\/p>\n<ul>\n<li><span>*.accdb<\/span><\/li>\n<li><span>*.accde<\/span><\/li>\n<li><span>*.accdw<\/span><\/li>\n<li><span>*.accdt<\/span><\/li>\n<li><span>*.accda<\/span><\/li>\n<li><span>*.accdr<\/span><\/li>\n<li><span>*.accdu<\/span><\/li>\n<\/ul>\n<h1><span>Preview Update KB5050081 <\/span><\/h1>\n<p><span>Also of interest this month is the preview update <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-28-2025-kb5050081-os-build-19045-5440-preview-a8c14cfd-0f24-43ad-aea2-641d86cb648f\" target=\"_blank\" rel=\"noopener\">KB5050081<\/a> as it should act as an early warning for IT admins and MSPs that still have Windows 10 devices in your fleets. This preview update forces an installation of the new <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/getting-started-with-the-new-outlook-for-windows-656bb8d9-5a60-49b2-a98b-ba7822bc7627\" target=\"_blank\" rel=\"noopener\">Outlook for Windows<\/a> app. If you have seen the \u201c<em>Try the new Outlook\u201d<\/em> button in Outlook then you\u2019ve already been exposed to the upcoming change. If you\u2019re not ready to migrate your fleet to the new Outlook you can find guidance from Microsoft on how to block the change until you\u2019re ready. Since the preview update is forcing the change then it\u2019s reasonable to expect that February\u2019s CU may also include this behavior. If you are not fond of the idea of having a ton of helpdesk request coming in for training and \u2018fix my broken Outlook\u2019, then getting messaging and action plans together before hand might save some end-user frustration. <\/span><\/p>\n<h2><strong>Microsoft Patch Tuesday Vulnerability Prioritization<\/strong><\/h2>\n<p>Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/p>\n<p><em>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/em><\/p>\n<table>\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Number<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"2%\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3 Width=\" 54=\"\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Title<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"2%\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" style=\"text-align: center;\" width=\"2%\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td5\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21292\" target=\"_blank\" rel=\"noopener\">CVE-2025-21292<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Search Service Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21189\" target=\"_blank\" rel=\"noopener\">CVE-2025-21189<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">MapUrlToZone Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21328\" target=\"_blank\" rel=\"noopener\">CVE-2025-21328<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">MapUrlToZone Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21329\" target=\"_blank\" rel=\"noopener\">CVE-2025-21329<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">MapUrlToZone Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21219\" target=\"_blank\" rel=\"noopener\">CVE-2025-21219<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">MapUrlToZone Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21365\" target=\"_blank\" rel=\"noopener\">CVE-2025-21365<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21364\" target=\"_blank\" rel=\"noopener\">CVE-2025-21364<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Microsoft Excel Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21362\" target=\"_blank\" rel=\"noopener\">CVE-2025-21362<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21354\" target=\"_blank\" rel=\"noopener\">CVE-2025-21354<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21315\" target=\"_blank\" rel=\"noopener\">CVE-2025-21315<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21314\" target=\"_blank\" rel=\"noopener\">CVE-2025-21314<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows SmartScreen Spoofing Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21309\" target=\"_blank\" rel=\"noopener\">CVE-2025-21309<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21299\" target=\"_blank\" rel=\"noopener\">CVE-2025-21299<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Kerberos Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21298\" target=\"_blank\" rel=\"noopener\">CVE-2025-21298<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows OLE Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21269\" target=\"_blank\" rel=\"noopener\">CVE-2025-21269<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows HTML Platforms Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21268\" target=\"_blank\" rel=\"noopener\">CVE-2025-21268<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">MapUrlToZone Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21210\" target=\"_blank\" rel=\"noopener\">CVE-2025-21210<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows BitLocker Information Disclosure Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21311\" target=\"_blank\" rel=\"noopener\">CVE-2025-21311<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows NTLM V1 Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21307\" target=\"_blank\" rel=\"noopener\">CVE-2025-21307<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21297\" target=\"_blank\" rel=\"noopener\">CVE-2025-21297<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21296\" target=\"_blank\" rel=\"noopener\">CVE-2025-21296<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">BranchCache Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21295\" target=\"_blank\" rel=\"noopener\">CVE-2025-21295<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21294\" target=\"_blank\" rel=\"noopener\">CVE-2025-21294<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Microsoft Digest Authentication Remote Code Execution Vulnerability<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-49120\" target=\"_blank\" rel=\"noopener\">CVE-2024-49120<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21334\" target=\"_blank\" rel=\"noopener\">CVE-2025-21334<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ED<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21333\" target=\"_blank\" rel=\"noopener\">CVE-2025-21333<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ED<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21335\" target=\"_blank\" rel=\"noopener\">CVE-2025-21335<\/a><\/td>\n<td width=\"10\"><\/td>\n<td width=\"306\">Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ED<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Summary<\/strong><\/h2>\n<p>As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0Patch Management\u00a0routines.<\/p>\n<p><strong>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span>Patch Management section of our blog<\/span><\/a>.<\/strong><\/p>\n<p><em>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<\/em><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><em>@cybersec_nerd<\/em><\/a><\/p>\n<p><em>LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span>thesecuritypope<\/span><\/a><\/em><\/p>\n<p><em>Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span>cybersec_nerd<\/span><\/a>\u00a0<\/em><span>\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-62615","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10 - N-able<\/title>\n<meta name=\"description\" content=\"159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10 - N-able\" \/>\n<meta property=\"og:description\" content=\"159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-30T11:16:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_PD_V2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10\",\"datePublished\":\"2025-01-30T11:16:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\"},\"wordCount\":1131,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\",\"name\":\"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2025-01-30T11:16:53+00:00\",\"description\":\"159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10 - N-able","description":"159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025","og_locale":"es_ES","og_type":"article","og_title":"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10 - N-able","og_description":"159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.","og_url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-01-30T11:16:53+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_PD_V2.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10","datePublished":"2025-01-30T11:16:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025"},"wordCount":1131,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025","url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025","name":"Patch Tuesday January 2025: Three Hyper-V Zero-days and New Outlook in Windows 10 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2025-01-30T11:16:53+00:00","description":"159 fixes in January 2025\u2019s Microsoft Patch Tuesday, including 3 Hyper-V zero-days Under Active Exploitation. Lewis Pope takes a deep dive.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-january-2025"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/62615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=62615"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/62615\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=62615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}