Microsoft Security

June 2025 Patch Tuesday: 66 Vulnerabilities Fixed, Including Two Zero-Days

Microsoft June 2025 Patch Tuesday

Microsoft’s June 2025 Patch Tuesday delivers security updates for 66 vulnerabilities, including one zero-day that’s actively exploited in the wild and another that was publicly disclosed prior to today’s fix. This month’s rollout addresses ten Critical bugs—eight are remote code execution (RCE) flaws, and two are elevation of privilege (EoP) vulnerabilities.

The breakdown by type:

  • 25 Remote Code Execution
  • 13 Elevation of Privilege
  • 17 Information Disclosure
  • 6 Denial of Service
  • 3 Security Feature Bypass
  • 2 Spoofing

🛑 Zero-Day Vulnerabilities – June 2025

CVETitleTypeExploitedDisclosedDetails
CVE-2025-33053WebDAV Remote Code ExecutionRCEExploited by APT group Stealth Falcon using malicious WebDAV URLs. Affects built-in Windows tools. Discovered by Check Point Research.
CVE-2025-33073Windows SMB Client Elevation of PrivilegeEoPPublicly disclosed. Exploitable via SMB coercion to gain SYSTEM privileges. Reported by multiple researchers including CrowdStrike, Synacktiv, and Google Project Zero.

These updates exclude fixes for Microsoft Edge, Mariner, and Power Automate. Non-security improvements are available in Windows 11 cumulative updates KB5060842 and KB5060999, and Windows 10 cumulative update KB5060533.

IT admins are advised to prioritize patching the above zero-days and other Critical vulnerabilities affecting Microsoft Office, SharePoint, WebDAV, and core Windows services.

📝 Complete List of Resolved Windows Vulnerabilities – June 2025

  • 13 Elevation of Privilege
  • 3 Security Feature Bypass
  • 25 Remote Code Execution
  • 17 Information Disclosure
  • 6 Denial of Service
  • 2 Spoofing

This includes critical issues in components like:

  • Office (Word, Excel, Outlook, SharePoint)
  • Windows WebDAV, Netlogon, Remote Desktop Services, Kernel, and SMB
  • Visual Studio, Windows Installer, Storage Management, DHCP, and LSASS

For the full list of CVEs and affected systems, consult the official Microsoft release documentation.

Stay Updated with ToolsLib! 🚀
Join our community to receive the latest cybersecurity tips, software updates, and exclusive insights straight to your inbox!

To top
×