March 2025 Windows Security Updates Now Released

March 2025 Windows Security Updates Now Released

On March 11, 2025, Microsoft rolled out crucial security updates across its Windows operating systems aimed at addressing critical vulnerabilities. These updates are essential for home users and system administrators alike to enhance the security posture of their systems.

This comprehensive overview delivers insights and links necessary for effectively managing the released updates, helping you understand the scope of vulnerabilities and the recommended actions to take.

Microsoft Windows Security Updates: March 2025

To fetch the complete list of updates manually, download the Excel spreadsheet here: Download March 2025 Security Updates List.

Key Highlights

  • Caution: The latest Windows 10 updates may cause the new Outlook app to install automatically.
  • There are a staggering 57 security updates designated for various Microsoft products and an additional 10 updates targeting non-Microsoft issues such as Chromium. Among these, 7 correct urgent zero-day vulnerabilities.
  • Identified Windows client issues include:
    • Windows 10 versions 1809, 21H2, and 22H2
    • Windows 11 versions 22H2, 23H2, and 24H2
  • Windows Server issues reported:
    • Windows Server 2008
    • Windows Server 2019
    • Windows Server 2022
  • Important: Versions 22H2 for Windows 11 Home and Pro have reached end of support; devices will be automatically upgraded.

Vulnerability Overview by Windows Versions

The table below summarizes critical vulnerabilities across supported Windows versions:

  • Windows 10 version 22H2:
    • Total vulnerabilities: 30 (2 critical, 28 important)
    • Significant vulnerabilities include:
      • Remote Desktop Client Remote Code Execution Vulnerability – CVE-2025-26645
      • Windows Remote Desktop Services Remote Code Execution Vulnerability – CVE-2025-24035
  • Windows 11 version 22H2 and 23H2:
    • Total vulnerabilities: 33 (3 critical, 30 important)
    • Includes vulnerabilities listed for Windows 10 plus:
    • Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability – CVE-2025-24084
  • Windows 11 version 24H2:
    • Total vulnerabilities: 33 (3 critical, 30 important, similar to version 23H2).
  • Windows Server 2008 R2 (Extended Support):
    • Vulnerabilities: 21 (3 critical, 18 important) including:
      • Windows Remote Desktop Services Remote Code Execution Vulnerability – CVE-2025-24035
      • Domain Name Service Remote Code Execution Vulnerability – CVE-2025-24064
  • Windows Server 2016:
    • Total vulnerabilities: 33 (4 critical, 29 important)
    • Includes all vulnerabilities listed for Server 2008 R2 plus:
      • Windows Remote Desktop Services Remote Code Execution Vulnerability – CVE-2025-24045

How to Apply Security Updates

Windows security updates are typically downloaded and installed automatically. For administrators aiming to expedite the process, here are the steps to follow:

  1. Open the Start menu and type “Windows Update”to access the settings.
  2. Click on “Check for Updates”to initiate a manual update search.
  3. If necessary, click on “Download & Install All”to manually install the updates.

You may also manually download the updates to install them:

Quick Links for Direct Downloads

  • Windows 10 version 22H2:
    • KB5053606 – Cumulative Update for March 2025
  • Windows 11 version 22H2:
    • KB5053602 – Cumulative Update for March 2025
  • Windows 11 version 23H2:
    • KB5053602 – Cumulative Update for March 2025
  • Windows 11 version 24H2:
    • KB5053598 – Cumulative Update for March 2025

Known Issues and Resolutions

Stay informed about the latest issues associated with the updates and their available workarounds:

  • Windows 10 version 22H2:
    • NEW: USB printer issues causing automatic printing. Workaround: Apply a Known Issue Rollback and adjust Group Policy settings.More details here.
  • Windows 11 version 22H2 / 23H2:
    • NEW: Similar USB printer issue as Windows 10. Solution outlined above.

Additional Resources

For ongoing updates, further reading and insights into Microsoft products, check these links:

Leave a Reply

Your email address will not be published. Required fields are marked *