This month, Microsoft has corrected a total of 57 security errors in Windows 10 and 11. There are six major flaws of them, and six other “zero day”, in other words, have already been exploited before cyber -attacks.
The second Tuesday of the month is “Patch Tuesday”, which day MicrosoftMicrosoft Post a set of safety fixes for Windows 10Windows 10 And 11, as well as firm software. Mars Tuesday’s patch includes fifty fixes. If the total number of numbers is exactly normal LimitLimit The failure is unusual: six have been ranked “criticism”, while six others are already exploiting criminals.
Of the pre-used safety flaws, three affect the NTFS file system and withdraw references CV-2025-24993, CV-2025-24991 and CV-2025-24984. The good news is that the first two need to extend the virtual hard drive (VHD), while the last requires access BodyBody The machine has the other three CV-2025-24985, a flaw in the Windows Fast Fat driver, CV-2025-24983, which affects the Sub system of Win32 nucleus, and eventually affects the CV-2025-26633, which affects Microsoft Management Console (MMC).
More than seven months after the end of Windows 10 life
In critical errors, CV-2025-24035, CV-2025-24045 and CV-2025-26645 affect the office from afar. The CV-2025-24057 Office has a flaw, while CV-2025-24064 is in the Windows DNS server, and in the sub system of CV-2025-24084 LinuxLinux. These twelve flaws are all serious and require the installation of as soon as possible. And it doesn’t stop there, because the update includes 45 additional errors.
This refreshing PortPort KB5053596 or KB5053606 for Windows 11, and KB5053598 or KB5053602 for Windows 11. It will still be 800 million computers that run on Windows 10, or 60 % of the market. If the majority should be able to migrate to Windows 11, several hundred million will be synchronized. With unreal number of flaws that will only increase after this date, does Microsoft really intend to abandon them in front of them Cyber attackCyber attack?