Security News > 2021 > April > Microsoft Has Busy April Patch Tuesday with Zero-Days, Exchange Fixes

Microsoft had its hands full Tuesday snuffing out five zero-day vulnerabilities, a flaw under active attack and applying more patches to its problem-plagued Microsoft Exchange Server software.
Of note, the U.S. National Security Agency released information on four critical Exchange Server vulnerabilities impacting versions released between 2013 and 2019.
"These vulnerabilities have been rated 'exploitation more likely' using Microsoft's Exploitability Index. Two of the four vulnerabilities are pre-authentication, meaning an attacker does not need to authenticate to the vulnerable Exchange server to exploit the flaw. With the intense interest in Exchange Server since last month, it is crucial that organizations apply these Exchange Server patches immediately," wrote Satnam Narang, staff research engineer with Tenable in commentary shared with Threatpost.
Troublesome given the ubiquitous nature of the Microsoft Office are four remote code execution vulnerabilities patched this month within the productivity suite.
Microsoft marks the vulnerability type as "Exploitation less likely," however, it's highly recommended to quickly patch and remediate any RCE vulnerabilities on systems, Goodman said: "Leaving latent vulnerabilities with RCE exploits can easily lead to a faster-spreading attack."
Microsoft's April Patch Tuesday update was complemented by Adobe's monthly slew of patches, which addressed 10 security bugs, seven of them critical.
News URL
https://threatpost.com/microsoft-april-patch-tuesday-zero-days/165393/
Related news
- Microsoft April 2025 Patch Tuesday fixes exploited zero-day, 134 flaws (source)
- Patch Tuesday: Microsoft Fixes 134 Vulnerabilities, Including 1 Zero-Day (source)
- Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws (source)
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days (source)
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft (source)
- Week in review: Probing activity on Palo Alto Networks GlobalProtect portals, Patch Tuesday forecast (source)
- Microsoft: Windows CLFS zero-day exploited by ransomware gang (source)
- Microsoft fixes actively exploited Windows CLFS zero-day (CVE-2025-29824) (source)
- Microsoft investigates global Exchange Admin Center outage (source)
- April's Patch Tuesday leaves unlucky Windows Hello users unable to login (source)