Microsoft June 2025 Patch Tuesday fixes exploited zero-day, 66 flaws
9 mins read

Microsoft June 2025 Patch Tuesday fixes exploited zero-day, 66 flaws

Today is Microsoft’s June 2025 Patch Tuesday, which includes security updates for 66 flaws, including one actively exploited vulnerability and another that was publicly disclosed.

This Patch Tuesday also fixes ten “Critical” vulnerabilities, eight being remote code execution vulnerabilities and two being elevation of privileges bugs.

The number of bugs in each vulnerability category is listed below:

  • 13 Elevation of Privilege Vulnerabilities
  • 3 Security Feature Bypass Vulnerabilities
  • 25 Remote Code Execution Vulnerabilities
  • 17 Information Disclosure Vulnerabilities
  • 6 Denial of Service Vulnerabilities
  • 2 Spoofing Vulnerabilities

This count does not include Mariner, Microsoft Edge, and Power Automate flaws fixed earlier this month.

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5060842 and KB5060999 cumulative updates and the Windows 10 KB5060533 cumulative update.

Two zero-days

This month’s Patch Tuesday fixes one actively exploited zero-day and one publicly disclosed vulnerability. Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The actively exploited zero-day vulnerability in today’s updates is:

CVE-2025-33053 – Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability

Microsoft fixed a remote code execution vulnerability discovered by Check Point Research

“A remote code execution vulnerability exists in Microsoft Windows Web Distributed Authoring and Versioning. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system,” reads a Check Point Research advisory.

Microsoft’s advisory further states that a user must click on a specially crafted WebDav URL for the flaw to be exploited.

A new report by Check Point Research explains that CVE-2025-33053 was exploited in zero-day attacks by an APT group named “Stealth Falcon”.

“In March 2025, Check Point Research identified an attempted cyberattack against a defense company in Turkey,” explained Check Point.

“The threat actors used a previously undisclosed technique to execute files hosted on a WebDAV server they controlled, by manipulating the working directory of a legitimate built-in Windows tool.”

“Following responsible disclosure, Microsoft assigned the vulnerability CVE-2025-33053 and released a patch on June 10, 2025, as part of their June Patch Tuesday updates.”

Microsoft attributes the discovery of this flaw to Alexandra Gofman and David Driker (Check Point Research).

The publicly disclosed zero-day is:

CVE-2025-33073 – Windows SMB Client Elevation of Privilege Vulnerability

Microsoft fixes a flaw in Windows SMB that allows attackers to gain SYSTEM privileges on vulnerable devices.

“Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network,” explains Microsoft.

“To exploit this vulnerability, an attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate. This could result in elevation of privilege,” further explains Microsoft.

Microsoft has not shared how the flaw was publicly disclosed. However, Born City reports that DFN-CERT (Computer Emergency Response Team of the German Research Network) began circulating warnings from RedTeam Pentesting about the flaw this week.

While an update is now available, the flaw can reportedly be mitigated by enforcing server-side SMB signing via Group Policy.

Microsoft attributes the discovery of this flaw to multiple researchers, including Keisuke Hirata with CrowdStrike, Synacktiv research with Synacktiv, Stefan Walter with SySS GmbH, RedTeam Pentesting GmbH, and James Forshaw of Google Project Zero.

Recent updates from other companies

Other vendors who released updates or advisories in June 2025 include:

  • Adobe released security updates for InCopy, Experience Manager, Commerce, InDesign, Substance 3D Sampler, Acrobat Reader, and Substance 3D Painter.
  • Cisco released patches for three vulnerabilities with public exploit code in its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP) products.
  • Fortinet released security updates for an OS command (‘OS Command Injection’) vulnerability in FortiManager, FortiAnalyzer & FortiAnalyzer-BigData products.
  • Google’s June 2025 security updates for Android fix numerous vulnerabilities. Google also fixed an actively exploited Google Chrome zero-day flaw.
  • Hewlett Packard Enterprise (HPE) issued security updates to fix eight vulnerabilities impacting StoreOnce,
  • Ivanti released security updates to fix three high-severity hardcoded key vulnerabilities in Workspace Control (IWC).
  • Qualcomm released security updates for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that are exploited in targeted attacks.
  • Roundcube released security updates for a critical remote code execution (RCE) flaw with a public exploit that is now exploited in attacks.
  • SAP releases security updates for multiple products, including a critical missing authorization check in SAP NetWeaver Application Server for ABAP.

The June 2025 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the June 2025 Patch Tuesday updates.

TagCVE IDCVE TitleSeverity
.NET and Visual StudioCVE-2025-30399.NET and Visual Studio Remote Code Execution VulnerabilityImportant
App Control for Business (WDAC)CVE-2025-33069Windows App Control for Business Security Feature Bypass VulnerabilityImportant
Microsoft AutoUpdate (MAU)CVE-2025-47968Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityImportant
Microsoft Local Security Authority Server (lsasrv)CVE-2025-33056Windows Local Security Authority (LSA) Denial of Service VulnerabilityImportant
Microsoft OfficeCVE-2025-47164Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-47167Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-47162Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-47173Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-47953Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-47165Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-47174Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office OutlookCVE-2025-47171Microsoft Outlook Remote Code Execution VulnerabilityImportant
Microsoft Office OutlookCVE-2025-47176Microsoft Outlook Remote Code Execution VulnerabilityImportant
Microsoft Office PowerPointCVE-2025-47175Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-47172Microsoft SharePoint Server Remote Code Execution VulnerabilityCritical
Microsoft Office SharePointCVE-2025-47166Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-47163Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-47170Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-47957Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-47169Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-47168Microsoft Word Remote Code Execution VulnerabilityImportant
Nuance Digital Engagement PlatformCVE-2025-47977Nuance Digital Engagement Platform Spoofing VulnerabilityImportant
Remote Desktop ClientCVE-2025-32715Remote Desktop Protocol Client Information Disclosure VulnerabilityImportant
Visual StudioCVE-2025-47959Visual Studio Remote Code Execution VulnerabilityImportant
WebDAVCVE-2025-33053Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution VulnerabilityImportant
Windows Common Log File System DriverCVE-2025-32713Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cryptographic ServicesCVE-2025-29828Windows Schannel Remote Code Execution VulnerabilityCritical
Windows DHCP ServerCVE-2025-33050DHCP Server Service Denial of Service VulnerabilityImportant
Windows DHCP ServerCVE-2025-32725DHCP Server Service Denial of Service VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-33052Windows DWM Core Library Information Disclosure VulnerabilityImportant
Windows HelloCVE-2025-47969Windows Virtualization-Based Security (VBS) Information Disclosure VulnerabilityImportant
Windows InstallerCVE-2025-33075Windows Installer Elevation of Privilege VulnerabilityImportant
Windows InstallerCVE-2025-32714Windows Installer Elevation of Privilege VulnerabilityImportant
Windows KDC Proxy Service (KPSSVC)CVE-2025-33071Windows KDC Proxy Service (KPSSVC) Remote Code Execution VulnerabilityCritical
Windows KernelCVE-2025-33067Windows Task Scheduler Elevation of Privilege VulnerabilityImportant
Windows Local Security Authority (LSA)CVE-2025-33057Windows Local Security Authority (LSA) Denial of Service VulnerabilityImportant
Windows Local Security Authority Subsystem Service (LSASS)CVE-2025-32724Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityImportant
Windows MediaCVE-2025-32716Windows Media Elevation of Privilege VulnerabilityImportant
Windows NetlogonCVE-2025-33070Windows Netlogon Elevation of Privilege VulnerabilityCritical
Windows Recovery DriverCVE-2025-32721Windows Recovery Driver Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2025-47955Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote Desktop ServicesCVE-2025-32710Windows Remote Desktop Services Remote Code Execution VulnerabilityCritical
Windows Routing and Remote Access Service (RRAS)CVE-2025-33064Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-33066Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows SDKCVE-2025-47962Windows SDK Elevation of Privilege VulnerabilityImportant
Windows Secure BootCVE-2025-3052Cert CC: CVE-2025-3052 InsydeH2O Secure Boot BypassImportant
Windows Security AppCVE-2025-47956Windows Security App Spoofing VulnerabilityImportant
Windows ShellCVE-2025-47160Windows Shortcut Files Security Feature Bypass VulnerabilityImportant
Windows SMBCVE-2025-33073Windows SMB Client Elevation of Privilege VulnerabilityImportant
Windows SMBCVE-2025-32718Windows SMB Client Elevation of Privilege VulnerabilityImportant
Windows Standards-Based Storage Management ServiceCVE-2025-33068Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-32719Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-24065Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-24068Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33055Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-24069Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33060Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33059Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33062Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33061Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33058Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-32720Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33065Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-33063Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Storage Port DriverCVE-2025-32722Windows Storage Port Driver Information Disclosure VulnerabilityImportant
Windows Win32K – GRFXCVE-2025-32712Win32k Elevation of Privilege VulnerabilityImportant

Leave a Reply

Your email address will not be published. Required fields are marked *