{"id":63361,"date":"2025-02-25T11:32:54","date_gmt":"2025-02-25T11:32:54","guid":{"rendered":"https:\/\/www.n-able.com\/?p=63361"},"modified":"2025-02-25T11:32:54","modified_gmt":"2025-02-25T11:32:54","slug":"patch-tuesday-february-2025","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025","title":{"rendered":"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched"},"content":{"rendered":"<p><em>Microsoft addresses fewer vulnerabilities in February 2025\u2019s Patch Tuesday, but those it does address have far reaching consequences. Lewis Pope investigates.<\/em><\/p>\n<p>The February 2025 updates from Microsoft this month deliver fixes for a much smaller number of vulnerabilities than previous months, but it does include an important fix for an NTLM hash vulnerability that was disclosed in December 2024.<\/p>\n<p>This is a great example of how relying solely on Microsoft\u2019s monthly patches to keep environments vulnerability free can leave IT teams with a false sense of the strength of their security posture. Timely patching of systems is a very important part of a proper Vulnerability Management program, but it will never be able to bring an environment to zero vulnerabilities. Understanding this can help defenders better protect the estates they are responsible for.<\/p>\n<h2><span>Microsoft Vulnerabilities <\/span><\/h2>\n<p>This month Microsoft released fixes for 56 vulnerabilities. These included:<\/p>\n<ul>\n<li><span>Two zero-day vulnerabilities that are Under Active Exploitation,<\/span><\/li>\n<li><span>a further two zero-day vulnerabilities that were previously disclosed (but as of time of writing have not been seen being publicly exploited);<\/span><\/li>\n<li><span>and, three critical remote code execution vulnerabilities. <\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21418\" target=\"_blank\" rel=\"noopener\">CVE-2025-21418<\/a> is an elevation of privilege vulnerability affecting the Windows Ancillary Function Driver for WinSock. Microsoft indicates it affects 37 builds of Windows since Windows Server 2008 R2 making the affected install base very large. It may be even larger than this as AFD.sys has been a component of Windows since Windows NT 3.1. As Microsoft has long since put many Windows systems into EOS, it\u2019s up to system admins to accept and mitigate risks that come from using unsupported systems. This vulnerability should be a top priority for this month as it requires no interaction from an end-user, has a low complexity and is Under Active Exploitation. It will likely become a common part of the toolkit for threat actors because of the wide range of targets it will be effective against.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21391\" target=\"_blank\" rel=\"noopener\">CVE-2025-21391<\/a> is a Windows Storage Elevation of privilege vulnerability that affects Windows builds since Windows Server 2016 and Windows 10 1607. This zero-day vulnerability is currently Under Exploitation and allows an attacker to delete arbitrary files from a target system. Microsoft references in the release notes for this vulnerability <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/59.html\" target=\"_blank\" rel=\"noopener\">Improper Link Resolution Before File Access<\/a> which mentions the ability to read or overwrite the contents of a file. There is scant other information from Microsoft on this vulnerability, but attacks using this vulnerability could be part of a chained attacks to compromise or DoS a targeted Windows system.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21377\" target=\"_blank\" rel=\"noopener\">CVE-2025-21377<\/a> is the aforementioned NTLM hash disclosure spoofing vulnerability that was disclosed by <a href=\"https:\/\/blog.0patch.com\/2024\/12\/url-file-ntlm-hash-disclosure.html\" target=\"_blank\" rel=\"noopener\">ACROS Security<\/a> in December. This vulnerability allows for an attacker to capture the NTLM hash of an authentication against an attacker-controlled server though the use of specially crafted files, providing the attacker with information needed to perform authentication attacks or attempt to crack the hash. ACROS provided a micro-patch via 0Patch when they made the disclosure, leaving those that do not leverage 0Patch unprotected against this vulnerability for two months until Microsoft delivered the fix in this month\u2019s patch release. This again highlights that simply relying on Microsoft patching, even if done in a hyper aggressive timetable of applying them as soon as they become available, can still leave systems vulnerable. Keeping systems as secure as possible in today\u2019s threat landscape takes a lot more effort than making sure patches are up to date.<\/p>\n<p>Also this month Microsoft adjusted its advice on which Windows OS builds are affected by <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" target=\"_blank\" rel=\"noopener\">CVE-2023-24932<\/a> to include Windows 11 24H2 and Windows Server 2025. It released security updates this patch Tuesday for Windows 11 22H2 and Windows 11 23H2. This is an almost two year gap between the original publication of the vulnerability with a fix from Microsoft, and additional Windows OS builds being included in the list of affected systems.<\/p>\n<h2><strong>Microsoft Patch Tuesday Vulnerability Prioritization<\/strong><\/h2>\n<p>Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/p>\n<p><em>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/em><\/p>\n<table>\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Number<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"2%\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3 Width=\" 54=\"\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Title<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"2%\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" style=\"text-align: center;\" width=\"2%\">\n<p class=\"p5\"><span class=\"s1\"><b>\u00a0<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td5\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" target=\"_blank\" rel=\"noopener\">CVE-2023-24932<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Secure Boot Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ED<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21418\" target=\"_blank\" rel=\"noopener\">CVE-2025-21418<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ED<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21391\" target=\"_blank\" rel=\"noopener\">CVE-2025-21391<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Windows Storage Elevation of Privilege Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ED<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21381\" target=\"_blank\" rel=\"noopener\">CVE-2025-21381<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21379\" target=\"_blank\" rel=\"noopener\">CVE-2025-21379<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">DHCP Client Service Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21376\" target=\"_blank\" rel=\"noopener\">CVE-2025-21376<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">C<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">EML<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21194\" target=\"_blank\" rel=\"noopener\">CVE-2025-21194<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Microsoft Surface Security Feature Bypass Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<tr>\n<td width=\"82\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21395\" target=\"_blank\" rel=\"noopener\">CVE-2025-21395<\/a><\/td>\n<td width=\"11\"><\/td>\n<td width=\"305\">Microsoft Access Remote Code Execution Vulnerability<\/td>\n<td width=\"10\"><\/td>\n<td width=\"86\" style=\"text-align: center;\">I<\/td>\n<td width=\"10\" style=\"text-align: center;\"><\/td>\n<td width=\"120\" style=\"text-align: center;\">ELL<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><span>Summary<\/span><\/h1>\n<p>Ensure that you maintain consistent patching procedures for assessment, testing, and deployment into your production environments. If your approach has typically centered around patching based on severity alone, it&#8217;s crucial to expand your patch management strategies. Integrate priority handling for patches related to Zero-Days, vulnerabilities with detected exploitations, and those with a higher likelihood of exploitation into your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\">Patch Management<\/a> routines.<\/p>\n<p><strong>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span>Patch Management section of our blog<\/span><\/a>.<\/strong><\/p>\n<p><em>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<\/em><a href=\"https:\/\/twitter.com\/cybersec_nerd\"><em>@cybersec_nerd<\/em><\/a><\/p>\n<p><em>LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span>thesecuritypope<\/span><\/a><\/em><\/p>\n<p><em>Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span>cybersec_nerd<\/span><\/a>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft addresses fewer vulnerabilities in February 2025\u2019s Patch Tuesday, but those it does address have far reaching consequences. Lewis Pope investigates.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-63361","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched - N-able<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched - N-able\" \/>\n<meta property=\"og:description\" content=\"Microsoft addresses fewer vulnerabilities in February 2025\u2019s Patch Tuesday, but those it does address have far reaching consequences. Lewis Pope investigates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T11:32:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_Header_V3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched\",\"datePublished\":\"2025-02-25T11:32:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\"},\"wordCount\":1009,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\",\"name\":\"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2025-02-25T11:32:54+00:00\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched - N-able","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025","og_locale":"it_IT","og_type":"article","og_title":"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched - N-able","og_description":"Microsoft addresses fewer vulnerabilities in February 2025\u2019s Patch Tuesday, but those it does address have far reaching consequences. Lewis Pope investigates.","og_url":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-02-25T11:32:54+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_Header_V3.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Lewis Pope","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched","datePublished":"2025-02-25T11:32:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025"},"wordCount":1009,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025","url":"https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025","name":"Patch Tuesday February 2025: Publicly disclosed NTLM Hash Vulnerability Patched - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2025-02-25T11:32:54+00:00","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/patch-tuesday-february-2025"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/63361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=63361"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/63361\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=63361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}