overview
Microsoft’s latest report from Patch Tuesday highlighted fixes for a significant number of vulnerabilities, two of which are new zero-day vulnerabilities: CVE-2025-21194 and CVE-2025-21377.
CVE-2025-21194 is a security feature bypass vulnerability affecting Microsoft Surface devices. This vulnerability has been assigned a CVSS v3.1 base score of 7.1. Microsoft says that this flaw is a hypervisor vulnerability that allows attacks to bypass UEFI and compromise the secure kernel. Exploiting this vulnerability requires an attacker to gain access to the same network as the target device and to convince the user to reboot their device. Due to the high complexity and multiple conditions needed for successful exploitation, Microsoft has assessed the exploitability of this vulnerability as "Less Likely."
CVE-2025-21377 is a New Technology LAN Manager (NTLM) Hash Disclosure Spoofing Vulnerability that was publicly disclosed prior to the release of a patch. This vulnerability allows an attacker to obtain a user's NTLMv2 hash, which could then be used to authenticate as that user. Exploitation requires minimal user interaction, such as selecting, inspecting, or performing an action other than opening or executing a malicious file. Microsoft has assessed this vulnerability as "Exploitation More Likely."
IOCs ADDED TO OUR THREAT FEEDS
At this time, there are no known IoCs associated with successful exploitation of these CVEs. Avertium remains vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
TTPs TO MONITOR
CVE-2025-21194: Microsoft Surface Security Feature Bypass
This vulnerability affects Microsoft Surface devices and allows attackers to bypass security features, potentially leading to unauthorized system access.
Tactic |
Technique |
Description |
Initial Access |
T1190 - Exploit Public-Facing Application |
If an attacker finds an exposed vulnerable Surface device, they may exploit the vulnerability remotely. |
Persistence |
T1547.001 - Registry Run Keys / Startup Folder |
Attackers may leverage bypassed security controls to establish persistence on the device. |
Defense Evasion |
T1211 - Exploitation for Defense Evasion |
Since this is a security feature bypass, it may allow an attacker to disable system protections. |
Privilege Escalation |
T1068 - Exploitation for Privilege Escalation |
If exploited successfully, attackers could use this vulnerability to gain higher privileges. |
Impact |
T1499.004 - Endpoint Denial of Service |
Attackers may use the exploit to cause system instability or prevent Surface devices from booting properly. |
CVE-2025-21377: NTLM Hash Disclosure Spoofing Vulnerability
This vulnerability allows an attacker to trick a victim into leaking NTLMv2 hashes, which can then be used for authentication relay attacks.
Tactic |
Technique |
Description |
Initial Access |
T1566.002 - Spearphishing Link |
Attackers may send malicious links or files that trigger NTLM hash disclosure. |
Credential Access |
T1187 - Forced Authentication |
The vulnerability forces NTLM authentication, leaking hashes that can be relayed or cracked. |
Credential Access |
T1110.003 - Password Spraying |
Attackers may attempt to reuse stolen NTLM hashes to authenticate against different systems. |
Lateral Movement |
T1550.002 - Use Alternate Authentication Material |
Stolen NTLM hashes can be used to authenticate to other networked systems. |
Lateral Movement |
T1021.002 - SMB/Windows Admin Shares |
Attackers may use NTLM hashes to access remote SMB shares. |
Defense Evasion |
T1070.004 - File Deletion |
Attackers may delete forensic logs after obtaining NTLM hashes to avoid detection. |
additional recommendations + information
SUPPORTING DOCUMENTATION