Known Actively Exploited Vulnerabilities Round-up (07.03.25-13.03.25)

This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.

AppCheck presents our weekly roundup of critical vulnerabilities being actively exploited ‘in the wild’ by organised threat actors, during the week ending 14th March 2025. Organisations in both the public and private sectors can use the list each week as an input to their vulnerability management prioritisation framework: ‘Known Exploited Vulnerabilities’ are vulnerabilities that are confirmed as being actively used to target and exploit organisations around the globe within the last seven days. As such, they represent perhaps the greatest ongoing cybersecurity risk to businesses, and a very real and present threat. The vulnerabilities are often being exploited by highly organised criminal groups for direct financial gain, via techniques such as malware and ransomware installation. AppCheck summarises the details of each known ongoing exploitation below, but for full details – including impact, versions affected, and any remediation or mitigation guidance – check out AppCheck’s free ‘Detections Service’ at https://detections.appcheck-ng.com/ – you can click on the title of any of the exploitations below to see more information from this service.

 

Commentary and Roundup

Patch Tuesday has come and gone, and – as is tradition – Microsoft once again takes centre stage. With six newly reported flaws under active exploitation, including privilege escalation (CVE-2025-24983) and information disclosure (CVE-2025-24984), attackers have certainly been busy. But they’re not alone, as CISA’s latest additions reveal that VMware, Ivanti, and Advantive have also found themselves in the firing line.

Multiple VMware platforms are being actively exploited via a trio of vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226), allowing sandbox escapes and arbitrary code execution – bad news for virtualised environments. Meanwhile, Ivanti Endpoint Manager is seeing active exploitation of path traversal flaws (CVE-2024-13159, CVE-2024-13160, CVE-2024-13161) that could lead to credential theft, and Advantive’s VeraCore is being targeted with SQL injection and unrestricted file upload attacks (CVE-2024-57968, CVE-2025-25181). With such a broad spread of active threats, it’s a timely reminder that staying ahead of attackers means keeping a watchful eye beyond just the biggest names in software.

 

CISA ‘Known Exploited Vulnerabilities’

CISA (America’s Cyber Defense Agency) maintains a catalogue of ‘KEV’s (Known Exploited Vulnerabilities), publishing alerts of known exploitations on an often-daily basis. Although intended primarily as advisories for US governmental and federal agencies, the list is openly published for the benefit of the wider cybersecurity community and network defenders, and to help every organisation better manage vulnerabilities to keep pace with a volatile and shifting threat landscape.

 

VMware Triple Threat – Multiple Exploitations (CVE-2025-22224, CVE-2025-22225 & CVE-2025-22226)

CISA has reported the active exploitation of three vulnerabilities in VMware’s ESXi, Workstation, Cloud Foundation, Fusion and Telco cloud products. Successful exploitation has led to attackers executing arbitrary code, escaping sandboxes and disclosing information.

 

Ivanti Endpoint Manager (EPM) – Multiple Exploitations (CVE-2024-13159, CVE-2024-13160 & CVE-2024-13161)

CISA has reported the active exploitation of three path traversal vulnerabilities in Ivanti’s Endpoint Manager. These exploitations have allowed hackers to leverage account credentials for relay attacks and compromising EPM clients.

 

Advantive VeraCore – Multiple Exploitations (CVE-2024-57968 & CVE-2025-25181)

CISA has reported the active exploitation of two vulnerabilities in VeraCore from Advantive, with attackers observed uploading unrestricted files and executing arbitrary SQL commands.

 

Microsoft Windows (MMC) – Improper Neutralization Exploitation (CVE-2025-26633)

CISA and Microsoft have reported active exploitation of an improper neutralization vulnerability in the Microsoft Management Console of Microsoft Windows. Successful exploitation has led to attackers bypassing security features.

 

Microsoft Windows (NTFS) – Heap-Based Buffer Overflow Exploitation (CVE-2025-24993)

CISA and Microsoft have reported active exploitation of a heap-based buffer overflow vulnerability in the Microsoft Windows NTFS. The exploitation has allowed attackers to locally execute arbitrary commands on vulnerable systems.

Microsoft Windows (Fast FAT Driver) – Integer Overflow Exploitation (CVE-2025-24985)

CISA and Microsoft have reported active exploitation of an integer overflow vulnerability in the Windows Fast FAT Driver in Microsoft Windows. Exploitation has been used by attackers to locally execute arbitrary commands on vulnerable systems.

 

Microsoft Windows (NTFS) – Out-Of-Bounds Read Exploitation (CVE-2025-24991)

CISA and Microsoft have reported active exploitation of an out-of-bounds read vulnerability in Microsoft Windows NTFS. The exploitation has allowed hackers to leverage the vulnerability to disclose information including the contents of memory.

 

Microsoft Windows (Win32k) – Use-After-Free Exploitation (CVE-2025-24983)

CISA and Microsoft have reported active exploitation of an use-after-free vulnerability in the Win32 Kernel Subsystem of Microsoft Windows. The exploitation has allowed attackers to escalate privileges to system level.

 

Microsoft Windows (NTFS) – Information Disclosure Exploitation (CVE-2025-24984)

CISA and Microsoft have reported active exploitation of an information disclosure vulnerability in Microsoft Windows NTFS. Exploitation has been reported with attackers employing malicious USB drives to disclose information including the contents of memory.

 

Elsewhere on the Web

Although CISA provides a generally broad coverage of the highest profile exploitations, it can sometimes lag behind the curve in time to initial report for emerging exploitations. It can also sometimes deliberately not publish some exploitations if it feels that there is limited threat to US government and federal agencies, due to its operational remit. AppCheck therefore uses numerous alternate threat intelligence sources to enrich its coverage of high profile exploitations and 0-days reported elsewhere. AppCheck processes and aims to prioritise the addition of detection for known-exploited vulnerabilities highlighted in non-CISA sources, in exactly the same way as for CISA-published ones.

 

Microsoft Windows (Authentication) – Link Following Exploitation (CVE-2024-21447)

Active exploitation of a link-following vulnerability (or ‘symlink’ attack) in Microsoft Windows Authentication has been reported with hackers exploiting the flaw to escalate privileges to system level.

 

Microsoft Windows (File Explorer) – Improper Access Control Exploitation (CVE-2024-38100)

Active exploitation of an improper access control vulnerability in Microsoft Windows File Explorer has been reported with attackers successfully exploiting the flaw to gain administrative privileges.

 

Microsoft Office (Equation Editor) – Memory Corruption Exploitation (CVE-2018-0802)

Active exploitation of a memory corruption vulnerability in the Equation Editor used within Microsoft Office applications has been reported that has allowed hackers to remotely execute arbitrary code.

 

HGS Fast Transit System – Exposed Dangerous Method or Function Exploitation (CVE-2024-12651)

Active exploitation of an exposed dangerous method or function vulnerability in the Fast Transit System mobile application from HGS has been reported with hackers asking affected users to pay via crypto currency with the threat of releasing personal information.

 


 

Next Roundup

To keep up to date with future high-profile advisories for critical ongoing exploitations that may threaten your technical estate, tune in next Friday for next week’s KEV roundup.

AppCheck now offers additional coverage of critical security updates from several key vendors too, including:

  • Quarterly Roundups of Security Updates from IVANTI – next due on 17th March 2025
  • Our End-of-Month Roundups of critical patch updates for all CISCO Products – next due on 27th March 2025
  • Our monthly coverage of the ‘Patch Tuesday’ updates from MICROSOFT and several other major vendors – next due on 9th April 2025
  • Our Monthly Security Advisory Roundups for PALO ALTO NETWORKS – next due on 10th April 2025
  • Our quarterly coverage of the ‘Critical Patch Updates’ from ORACLE – next due on 15th April 2025

 

 

About AppCheck

AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network, and cloud infrastructure. AppCheck are authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA).

 

Get started with Appcheck

No software to download or install.

Contact us or call us 0113 887 8380

About AppCheck

AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network and cloud infrastructure. AppCheck are authorised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA)

No software to download or install.
Contact us or call us 0113 887 8380

Start your free trial

Your details
IP Addresses
URLs

Get in touch