Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Ivanti: Zero-Day Ransomware & 121 CVEs

Ivanti
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Microsoft's April 2025 Patch Tuesday resolves 121 CVEs, including one zero-day (CVE-2025-29824) actively exploited by Storm2460 ransomware campaigns using PipeMagic malware
  • High-risk LDAP and RDP vulnerabilities in the Windows OS update require no user interaction and are attractive targets for threat actors, though not yet exploited
  • Apple released 131 macOS vulnerabilities and Google addressed 60 Android CVEs, with multiple zero-days now being exploited on older platforms across both ecosystems
  • Browser security requires weekly patching cadence as Chrome, Edge, and Firefox release continuous updates; Chrome's March zero-day (CVE-2025-2476) highlights ongoing browser risks
  • Windows 10 end-of-life in October 2025 is driving migrations to Windows 11, with Copilot causing performance issues on older hardware requiring configuration adjustments
  • Critical Linux vulnerabilities include Tomcat CVE-2025-24813 (CVSS 9.8) affecting all distributions and .NET 6/7 accumulating security debt as end-of-life versions

Critical Zero-Day Vulnerability in Windows CLFS

The April 2025 Patch Tuesday addresses 121 Microsoft CVEs, with one actively exploited zero-day vulnerability (CVE-2025-29824) in the Windows Common Log File System (CLFS). This vulnerability is being weaponized by the threat actor Storm2460 in active ransomware campaigns using the PipeMagic malware family. Organizations with ransomware defense as a priority should consider accelerating deployment of the Windows OS update, which resolves this critical exploit along with 84-87 additional vulnerabilities depending on the Windows version. The urgency stems from the vulnerability's use in live attacks, making it a high-priority patch for enterprise environments.

High-Risk LDAP and RDP Vulnerabilities

Beyond the zero-day, security researchers have flagged several concerning vulnerabilities in the April OS update that are attractive targets for threat actors. Two LDAP vulnerabilities require no user interaction to exploit, making them particularly dangerous for environments where LDAP is exposed across network perimeters. Additionally, two Remote Code Execution (RCE) vulnerabilities in Windows Remote Desktop pose significant risk for organizations running RDP, especially if exposed on the network perimeter. While these vulnerabilities are not yet actively exploited, their low exploitation complexity and high CVSS scores make them prime candidates for future attacks.

Cross-Platform Security Updates and Browser Patching

April's security landscape extends beyond Microsoft, with Apple releasing 62 iOS/iPad vulnerabilities and 131 macOS Sequoia CVEs, including two zero-days now being exploited on older platforms. Google addressed 60 Android vulnerabilities, including two zero-days used by digital forensics firms. The webinar emphasizes the critical need for weekly browser patching, as Chrome, Edge, and Firefox all released multiple security updates between Patch Tuesdays. Chrome's continuous weekly release cycle, combined with Edge's dependency on Chromium, means organizations should shift to weekly browser update cadences rather than monthly cycles. Adobe Creative Suite updates addressed critical vulnerabilities across six applications, though none are actively exploited.

Windows 10 End-of-Life and Linux Considerations

With Windows 10 end-of-life approaching in October 2025, organizations are actively migrating to Windows 11, though performance challenges on older hardware are notable. Copilot's background processes can consume 10-50% CPU on aging systems, requiring configuration adjustments or disabling to restore baseline performance. For organizations unable to complete migration, Microsoft offers Extended Security Updates (ESU) for three years, which Ivanti supports in EPM, Security Controls, and Neurons Patch Management. On the Linux side, a critical Tomcat vulnerability (CVE-2025-24813) with a 9.8 CVSS score affects all distributions, and .NET 6 and 7 are now accumulating security debt as they reach end-of-life without patches for recent vulnerabilities.

Chapters

0:00 - Introduction and Overview
1:05 - April Patch Tuesday Releases
3:17 - Microsoft Zero-Day Vulnerability
5:04 - Additional High-Risk Vulnerabilities
7:12 - Apple Security Updates
9:00 - Google Android Zero-Days
10:02 - Chrome Browser Vulnerabilities
20:28 - Ivanti Security Updates
21:07 - Linux Vulnerabilities
24:32 - Windows 10 End-of-Life
28:37 - Microsoft Bulletin Releases
32:38 - Windows 10 Updates
34:00 - Office Updates
35:30 - Between Patch Tuesdays

Key Quotes

0:27 "There were a lot of CVEs resolved. So we're going to go through and talk a little bit about some of the recent news, vulnerabilities that you need to be aware of, especially the ones actively being targeted."
3:46 "This one is absolutely being utilized by a threat actor. There's a malware family called PipeMagic. It's a malware family that the threat actor behind this one is called Storm2460, but they're using this in ransomware campaigns actively today."
4:14 "For those of you who have ransomware as one of your top priorities to defend against, this could warrant trying to push the OS update faster than normal."
6:04 "There were a pair of LDAP vulnerabilities, the two here, that do not require any user interaction to be able to exploit. So if they were exploited, it would be something where an attacker could rapidly take advantage of."
12:00 "Browsers, you really need to get to a cadence of updating weekly. There's so much of a continuous release cycle with the browsers. Chrome releases weekly, meaning Edge releases weekly. And Firefox releases two to three times a month on average."
25:42 "It was running probably 10 to 50% CPU usage when I was doing nothing on the system. I got in and started looking around and had to disable a few things. Like I saw that my audio driver was spiking quite a bit. And what was happening was Copilot was interacting with the audio."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Vulnerability Management
  • Webinar
  • Technical Deep Dive
  • Threat Intelligence
  • Best Practices
  • Patch Tuesday
  • Zero-Day Vulnerabilities
  • Ransomware
  • Windows Security Updates
  • Browser Security
  • LDAP Vulnerabilities
  • RDP Security
  • Windows 10 End-of-Life
  • Apple Security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Ivanti: Zero-Day Ransomware & 121 CVEs

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version