Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
Microsoft’s latest report from Patch Tuesday highlighted fixes for a significant number of vulnerabilities, two of which are new zero-day vulnerabilities: CVE-2025-21194 and CVE-2025-21377.
CVE-2025-21194 is a security feature bypass vulnerability affecting Microsoft Surface devices. This vulnerability has been assigned a CVSS v3.1 base score of 7.1. Microsoft says that this flaw is a hypervisor vulnerability that allows attacks to bypass UEFI and compromise the secure kernel. Exploiting this vulnerability requires an attacker to gain access to the same network as the target device and to convince the user to reboot their device. Due to the high complexity and multiple conditions needed for successful exploitation, Microsoft has assessed the exploitability of this vulnerability as "Less Likely."
CVE-2025-21377 is a New Technology LAN Manager (NTLM) Hash Disclosure Spoofing Vulnerability that was publicly disclosed prior to the release of a patch. This vulnerability allows an attacker to obtain a user's NTLMv2 hash, which could then be used to authenticate as that user. Exploitation requires minimal user interaction, such as selecting, inspecting, or performing an action other than opening or executing a malicious file. Microsoft has assessed this vulnerability as "Exploitation More Likely."
IOCs ADDED TO OUR THREAT FEEDS
At this time, there are no known IoCs associated with successful exploitation of these CVEs. Avertium remains vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
TTPs TO MONITOR
CVE-2025-21194: Microsoft Surface Security Feature Bypass
This vulnerability affects Microsoft Surface devices and allows attackers to bypass security features, potentially leading to unauthorized system access.
Tactic |
Technique |
Description |
Initial Access |
T1190 - Exploit Public-Facing Application |
If an attacker finds an exposed vulnerable Surface device, they may exploit the vulnerability remotely. |
Persistence |
T1547.001 - Registry Run Keys / Startup Folder |
Attackers may leverage bypassed security controls to establish persistence on the device. |
Defense Evasion |
T1211 - Exploitation for Defense Evasion |
Since this is a security feature bypass, it may allow an attacker to disable system protections. |
Privilege Escalation |
T1068 - Exploitation for Privilege Escalation |
If exploited successfully, attackers could use this vulnerability to gain higher privileges. |
Impact |
T1499.004 - Endpoint Denial of Service |
Attackers may use the exploit to cause system instability or prevent Surface devices from booting properly. |
CVE-2025-21377: NTLM Hash Disclosure Spoofing Vulnerability
This vulnerability allows an attacker to trick a victim into leaking NTLMv2 hashes, which can then be used for authentication relay attacks.
Tactic |
Technique |
Description |
Initial Access |
T1566.002 - Spearphishing Link |
Attackers may send malicious links or files that trigger NTLM hash disclosure. |
Credential Access |
T1187 - Forced Authentication |
The vulnerability forces NTLM authentication, leaking hashes that can be relayed or cracked. |
Credential Access |
T1110.003 - Password Spraying |
Attackers may attempt to reuse stolen NTLM hashes to authenticate against different systems. |
Lateral Movement |
T1550.002 - Use Alternate Authentication Material |
Stolen NTLM hashes can be used to authenticate to other networked systems. |
Lateral Movement |
T1021.002 - SMB/Windows Admin Shares |
Attackers may use NTLM hashes to access remote SMB shares. |
Defense Evasion |
T1070.004 - File Deletion |
Attackers may delete forensic logs after obtaining NTLM hashes to avoid detection. |
additional recommendations + information
SUPPORTING DOCUMENTATION