After conducting a detailed analysis in January, we've compiled a list of vulnerabilities that are currently classified as trending. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.
After conducting a detailed analysis in January, we've compiled a list of vulnerabilities that are currently classified as trending. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future. We strongly recommend verifying whether your organization has addressed these vulnerabilities, as well as those highlighted in our previous digests.
Six vulnerabilities were found in Microsoft products. Three of them are critical: CVE-2024-49112, CVE-2024-43468, and CVE-2025-21298); another three are of high severity: CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335.
The vulnerability CVE-2024-49112 enables remote code execution through a DCE/RPC request. The vulnerability CVE-2024-43468 allows privilege escalation to SYSTEM by executing arbitrary SQL queries. The vulnerability CVE-2025-21298 enables remote code execution when a victim opens a specially crafted email.
Three high-severity vulnerabilities in the Hyper-V NT Kernel Integration VSP component enable privilege escalation to SYSTEM level via heap buffer overflow or use-after-free memory flaws.
A vulnerability in Fortinet products (CVE-2024-55591) allows attackers to gain super-admin privileges on FortiOS and FortiProxy devices by sending specially crafted requests.
The high-severity vulnerability in 7-Zip (CVE-2025-0411) allows attackers to execute arbitrary code when extracting files from specially crafted archives.
Read below to learn about these vulnerabilities, how they are exploited, and mitigation strategies in this digest.