Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products

Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products

Microsoft, Fortinet, and Ivanti have released critical security patches following the discovery of several zero-day vulnerabilities that are actively being exploited in the wild.

Microsoft shipped patches for over 70 security vulnerabilities affecting its software ecosystem, five of which have been flagged as actively exploited zero-day flaws, spanning a variety of Windows components and present serious risks for privilege escalation and remote code execution.

The actively exploited zero-days include:

  • CVE-2025-30397 – Scripting Engine Memory Corruption Vulnerability

  • CVE-2025-30400 – Microsoft Desktop Window Manager (DWM) Core Library Elevation of Privilege Vulnerability

  • CVE-2025-32701 – Windows Common Log File System (CLFS) Driver Elevation of Privilege Vulnerability

  • CVE-2025-32706 – Another CLFS Driver Elevation of Privilege Vulnerability

  • CVE-2025-32709 – Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

The flaws could allow attackers to gain elevated privileges on affected systems or execute arbitrary code, potentially compromising entire networks. Microsoft has urged users and administrators to apply the patches immediately.

Cybersecurity firm Fortinet has also patched a critical stack-based buffer overflow vulnerability in its enterprise phone system product FortiVoice, identified as CVE-2025-32756. The flaw affects several Fortinet products, including FortiMail, FortiNDR, FortiRecorder, and FortiCamera, and can be exploited remotely via malicious HTTP requests.

Fortinet confirmed the vulnerability has been exploited in the wild, particularly targeting FortiVoice devices. The attackers reportedly performed network scans, erased system crash logs, and enabled debugging functions to harvest credentials, including those from SSH login attempts. While the company has not disclosed the identity of the threat actors or the scale of the attacks, it is urging customers to update affected products without delay.

Ivanti has released patches for two severe vulnerabilities CVE-2025-4427 (authentication bypass) and CVE-2025-4428 (remote code execution) in its Endpoint Manager Mobile (EPMM) software, which have been exploited together to achieve remote code execution.

The flaws impact multiple versions of EPMM, including 11.12.0.4 and earlier (fixed in 11.12.0.5), 12.3.0.1 and earlier (fixed in 12.3.0.2),

12.4.0.1 and earlier (fixed in 12.4.0.2), 12.5.0.0 and earlier (fixed in 12.5.0.1)

Ivanti credited CERT-EU for reporting the issues and acknowledged that a small number of customers have been affected. The vulnerabilities stem from two unnamed open-source libraries embedded in EPMM. The company is still investigating the incident and has not confirmed whether other applications using the same libraries are also vulnerable.


Back to the list

Latest Posts

Cyber Security Week in Review: May 16, 2025

Cyber Security Week in Review: May 16, 2025

In brief: Microsoft, Fortinet, Ivanti, and Google patch zero-days, crypto exchange Coinbase reveals a data breach, and more.
16 May 2025
Russia-linked espionage operation targeting webmail servers via XSS flaws

Russia-linked espionage operation targeting webmail servers via XSS flaws

The campaign exploits XSS vulnerabilities in widely used webmail servers to steal sensitive data from high-value targets.
15 May 2025
Kosovo man extradited to US for running BlackDB.cc criminal marketplace

Kosovo man extradited to US for running BlackDB.cc criminal marketplace

If convicted on all counts, Masurica faces up to 55 years in federal prison.
14 May 2025