• About
  • Disclaimer
  • Privacy Policy
  • Contact
Friday, July 18, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

June Patch Tuesday digs into 67 bugs – Sophos Information

Md Sazzad Hossain by Md Sazzad Hossain
0
June Patch Tuesday digs into 67 bugs – Sophos Information
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


.Microsoft on Tuesday released 67 patches affecting 12 product households. Ten of the addressed points, 5 involving 365 and Workplace and one involving SharePoint, are thought of by Microsoft to be of Critical severity, and 17 have a CVSS base rating of 8.0 or increased. One, an Vital-severity RCE in Home windows associated to WEBDAV (CVE-2025-33053), is identified to be below lively exploitation within the wild. A further Vital-severity SMB subject has been publicly disclosed, however will not be at the moment identified to be below exploit. 

At patch time, 9 further CVEs are extra more likely to be exploited within the subsequent 30 days by the corporate’s estimation, not together with the WEBDAV subject talked about above. Numerous of this month’s points are amenable to direct detection by Sophos protections, and we embody info on those in a desk beneath. This most actually consists of CVE-2025-33053, wherein Sophos itself has taken a specific curiosity – and, apparently, vice versa.

Along with these patches, ten Adobe Reader fixes, 4 of them thought of to be of Important severity, are included within the launch. These are listed in Appendix D beneath. That appendix additionally contains info on two Edge-related vulnerabilities and a Important-severity Energy Automate subject that was addressed earlier this month, in addition to restricted info on a Important-severity bug in Copilot for which an advisory was launched the next day (Wednesday). The periodically launched Servicing Stack updates are additionally out there.  

We’re as at all times together with on the finish of this put up further appendices itemizing all Microsoft’s patches sorted by severity, by predicted exploitability timeline and CVSS Base rating, and by product household; an appendix overlaying the advisory-style updates; and a breakout of the patches affecting the assorted Home windows Server platforms nonetheless in assist.  

By the numbers

  • Whole CVEs: 67
  • Publicly disclosed: 1
  • Exploit detected: 1
  • Severity
    • Important: 10
    • Vital: 57
  • Affect
    • Distant Code Execution: 26
    • Data Disclosure: 17
    • Elevation of Privilege: 13
    • Denial of Service: 6
    • Safety Characteristic Bypass: 3
    • Spoofing: 2
  • CVSS base rating 9.0 or higher: 0*
  • CVSS base rating 8.0 or later: 18

 * One subject, affecting Energy Automate for Desktop however patched by Microsoft on June 5, has been assigned a 9.8 CVSS base rating. Because it was mitigated previous to launch, we’re treating that info as advisory-only and don’t embody it on this month’s statistics. Likewise, the Copilot advisory launched on June 11 has a CVSS base rating of 9.3, however doesn’t determine into these tallies or charts.

A bar chart showing the June 2025 patches sorted by impact and color-coded by severity; information present in text

Determine 1: A proportionally heavier-than-usual ten Important-severity patches have been launched in June,  although unusually six of these happen in 365, Workplace, or SharePoint fairly than the extra customary Home windows. (Two Edge updates coated this month aren’t launched with full impression info and thus don’t seem on this chart; we’re additionally excluding the Energy Automate patch as mentioned above) 

Merchandise 

  • Home windows: 45*
  • 365: 15
  • Workplace: 14
  • SharePoint: 5
  • Visible Studio: 2
  • Phrase: 2
  • .NET: 1
  • Excel: 1
  • Microsoft AutoUpdate for Macintosh: 1
  • Nuance Digital Engagement Platform: 1
  • Outlook: 1
  • PowerPoint: 1

* One Home windows SDK patch (CVE-2025-47962) and one patch affecting the Home windows Safety App part (CVE-2025-47956) are included within the Home windows counts for reader comfort, although neither impacts particular variations of the shopper or server platforms.  

As is our customized for this listing, CVEs that apply to multiple product household are counted as soon as for every household they have an effect on. We word that CVE names don’t at all times replicate affected product households intently. Specifically, some CVEs names within the Workplace household might point out merchandise that don’t seem within the listing of merchandise affected by the CVE, and vice versa.

A bar chart showing the June 2025 patches sorted by product family and color-coded by severity; information in article text

Determine 2: Twelve product households determine in Could’s Patch Tuesday launch; the Nuance medical-product household returns to the charts for a second month, this time addressing a spoofing subject in its Digital Engagement Platform 

Notable June updates 

Along with the problems mentioned above, a number of particular objects benefit consideration.  

CVE-2025-33053 — Internet Distributed Authoring and Versioning (WebDAV) Distant Code Execution Vulnerability 

The one patched subject at the moment identified to be below exploit within the wild is an Vital-severity flaw in Internet Distributed Authoring and Versioning code, which has been underpinning a lot of the web because the IE period. That’s the issue; this patch touches the MSHTML, EdgeHTML, and scripting platforms, that are all nonetheless supported. Because of this these Microsoft prospects at the moment taking Safety Solely updates want to put in the IE Cumulative updates to correctly guard towards this vulnerability – one thing right here for everybody, in different phrases. 

The adversaries exploiting that vulnerability apparently discovered Sophos protections vexing.  Endpoint safety scans new applications earlier than they run—however after launch, scanning drops off. Attackers exploit this by delivering applications with encrypted our bodies that evade static scanning and AI fashions. As soon as working, the code decrypts itself, hundreds implants, and executes completely in reminiscence—by no means touching disk. 

Sophos counters this with Dynamic Shellcode Safety, which limits how a lot executable reminiscence a course of can allocate. That restriction breaks stealthy in-memory assaults, forcing adversaries to revert to noisier, extra detectable methods like distant injection—the place they’re a lot simpler to catch. 

 After that the attackers would have run into a number of extra Sophos layers of blacklist, antimalware signatures, and different defenses — nevertheless it’s fascinating to us to see ourselves mirrored in an adversary’s code as a very powerful nut to crack. In any case, we suggest as at all times that defenders prioritize higher-profile patches reminiscent of this one. 

CVE-2025-33073 – Home windows SMB Consumer Elevation of Privilege Vulnerability 

It’s not identified to be below lively exploitation but, and Microsoft signifies that they assume it’s much less more likely to be exploited throughout the subsequent 30 days, however this Vital-severity EoP is the one June CVE identified to have been publicly disclosed up to now. The problem comes all the way down to improper entry controls, and it impacts all supported Home windows shopper and server variations. 

CVE-2025-47166 — Microsoft SharePoint Server Distant Code Execution Vulnerability 

After debuting in Could, “zcgonvh’s cat Vanilla” makes an instantaneous return look on the finder roster – that’s proper, the cat got here again the very subsequent Patch Tuesday. 

CVE-2025-32711 — M365 Copilot Data Disclosure Vulnerability 

Lastly, one CVE that was not launched within the Tuesday assortment, however merited the discharge of an advisory the next day: a Important-severity, CVSS-base 9.3, information-disclosure error that made it attainable for an unauthorized attacker to make use of command injection to reveal info from the AI software. The vulnerability was responsibly disclosed to Microsoft and the corporate said early Wednesday that the patch is already pushed to prospects.  

A bar chart showing cumulative patch totals, sorted by impact and color-coded by severity, for the patches released so far in 2025

Determine 3: As we wrap up the primary half of the yr, the proportion of Important-severity RCEs over the previous six months is eye-catching 

A bar chart comparing assigned severities during the first halves of 2024 and 2025; highlights covered in text

Determine 4: Evaluating first-half totals for 2024 and 2025, we see that the excessive variety of Important-severity RCEs stands out much more strongly when in comparison with the yr earlier than – 40, in contrast with simply 9 for the primary half of the yr earlier than. A couple of different developments stand out as effectively, together with massive year-over-year will increase in info disclosure CVEs (44 in 1H24, 77 up to now in 2025) and denial of service points (34 in 1H24, 57 up to now in 2025) 

Sophos protections 

CVE  Sophos Intercept X/Endpoint IPS  Sophos XGS Firewall 
CVE-2025-32713  Exp/2532713-A  Exp/2532713-A 
CVE-2025-32714  Exp/2532714-A  Exp/2532714-A 
CVE-2025-33053  sid:2311111  sid:2311111 
CVE-2025-33070  sid:2311128  sid:2311128 
CVE-2025-47162  sid:2311145  sid:2311145 
CVE-2025-47164  sid:2311146  sid:2311146 
CVE-2025-47167  sid:231113  sid:231113 

 

CVE-2025-33053 additionally has an relevant detection of word, Troj/UrlRun-B, along with the XSG signature famous above. 

As you may each month, for those who don’t need to wait on your system to drag down Microsoft’s updates itself, you may obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe software to find out which construct of Home windows 10 or 11 you’re working, then obtain the Cumulative Replace package deal on your particular system’s structure and construct quantity. 

Appendix A: Vulnerability Affect and Severity 

It is a listing of June patches sorted by impression, then sub-sorted by severity. Every listing is additional organized by CVE.  

Distant Code Execution (25 CVEs) 

Important severity 
CVE-2025-29828  Home windows Schannel Distant Code Execution Vulnerability 
CVE-2025-32710  Home windows Distant Desktop Providers Distant Code Execution Vulnerability 
CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47172  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-30399  .NET and Visible Studio Distant Code Execution Vulnerability 
CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
CVE-2025-33064  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-33066  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-47163  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47166  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47170  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47173  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47174  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 
CVE-2025-47176  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47959  Visible Studio Distant Code Execution Vulnerability 

 

Data Disclosure (17 CVEs) 

Vital severity 
CVE-2025-24065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24068  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24069  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32715  Distant Desktop Protocol Consumer Data Disclosure Vulnerability 
CVE-2025-32719  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32720  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32722  Home windows Storage Port Driver Data Disclosure Vulnerability 
CVE-2025-33052  Home windows DWM Core Library Data Disclosure  Vulnerability 
CVE-2025-33055  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33058  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33059  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33060  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33061  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33062  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33063  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-47969  Home windows Virtualization-Based mostly Safety (VBS) Data Disclosure Vulnerability 

 

Elevation of Privilege (13 CVEs) 

Important severity 
CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
Vital severity 
CVE-2025-32712  Win32k Elevation of Privilege Vulnerability 
CVE-2025-32713  Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability 
CVE-2025-32714  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-32716  Home windows Media Elevation of Privilege Vulnerability 
CVE-2025-32718  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-32721  Home windows Restoration Driver Elevation of Privilege Vulnerability 
CVE-2025-33067  Home windows Process Scheduler Elevation of Privilege Vulnerability 
CVE-2025-33073  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-33075  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-47955  Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability 
CVE-2025-47962  Home windows SDK Elevation of Privilege Vulnerability 
CVE-2025-47968  Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability 

 

Denial of Service (6 CVEs) 

Vital severity 
CVE-2025-32724  Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability 
CVE-2025-32725  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33050  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33056  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33057  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33068  Home windows Requirements-Based mostly Storage Administration Service Denial of Service Vulnerability 
CVE-2025-32724  Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability 

 

Safety Characteristic Bypass (3 CVEs) 

Vital severity 
CVE-2025-3052  Cert CC: CVE-2025-3052 InsydeH2O Safe Boot Bypass 
CVE-2025-33069  Home windows App Management for Enterprise Safety Characteristic Bypass Vulnerability 
CVE-2025-47160  Home windows Shortcut Information Safety Characteristic Bypass Vulnerability 

 

Spoofing (2 CVEs) 

Vital severity 
CVE-2025-47956  Home windows Safety App Spoofing Vulnerability 
CVE-2025-47977  Nuance Digital Engagement Platform Spoofing Vulnerability 

 

 

Appendix B: Exploitability and CVSS 

It is a listing of the June CVEs judged by Microsoft to be both below exploitation within the wild or extra more likely to be exploited within the wild throughout the first 30 days post-release. The listing is additional organized by CVE. The three Workplace objects extra more likely to be exploited within the subsequent 30 days (CVE-2025-47162, CVE-2025-47164, and CVE-2025-47167) are all exploitable through Preview Pane. 

Exploitation detected 
CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
Exploitation extra doubtless throughout the subsequent 30 days 
CVE-2025-32713  Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability 
CVE-2025-32714  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47962  Home windows SDK Elevation of Privilege Vulnerability 

 

It is a listing of June’s CVEs with a Microsoft-assessed CVSS Base rating of 8.0 or increased. They’re organized by rating and additional sorted by CVE. For extra info on how CVSS works, please see our collection on patch prioritization schema.  

CVSS Base  CVSS Temporal  CVE  Title 
8.8  8.2  CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-33064  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-33066  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
8.8  7.9  CVE-2025-33073  Home windows SMB Consumer Elevation of Privilege Vulnerability 
8.8  7.7  CVE-2025-47163  Microsoft SharePoint Server Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-47166  Microsoft SharePoint Server Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-47172  Microsoft SharePoint Server Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-33067  Home windows Process Scheduler Elevation of Privilege Vulnerability 
8.4  7.3  CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 
8.1  7.1  CVE-2025-29828  Home windows Schannel Distant Code Execution Vulnerability 
8.1  7.1  CVE-2025-32710  Home windows Distant Desktop Providers Distant Code Execution Vulnerability 
8.1  7.1  CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
8.1  7.1  CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 

 

Appendix C: Merchandise Affected 

It is a listing of June’s patches sorted by product household, then sub-sorted by severity. Every listing is additional organized by CVE. Patches which can be shared amongst a number of product households are listed a number of occasions, as soon as for every product household. Sure important points for which advisories have been issued are coated in Appendix D, and points affecting Home windows Server are additional sorted in Appendix E. All CVE titles are correct as made out there by Microsoft; for additional info on why sure merchandise might seem in titles and never product households (or vice versa), please seek the advice of Microsoft. 

Home windows (45 CVEs) 

Important severity 
CVE-2025-29828  Home windows Schannel Distant Code Execution Vulnerability 
CVE-2025-32710  Home windows Distant Desktop Providers Distant Code Execution Vulnerability 
CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-3052  Cert CC: CVE-2025-3052 InsydeH2O Safe Boot Bypass 
CVE-2025-24065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24068  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24069  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32712  Win32k Elevation of Privilege Vulnerability 
CVE-2025-32713  Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability 
CVE-2025-32714  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-32715  Distant Desktop Protocol Consumer Data Disclosure Vulnerability 
CVE-2025-32716  Home windows Media Elevation of Privilege Vulnerability 
CVE-2025-32718  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-32719  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32720  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32721  Home windows Restoration Driver Elevation of Privilege Vulnerability 
CVE-2025-32722  Home windows Storage Port Driver Data Disclosure Vulnerability 
CVE-2025-32724  Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability 
CVE-2025-32725  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33050  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33052  Home windows DWM Core Library Data Disclosure  Vulnerability 
CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
CVE-2025-33055  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33056  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33057  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33058  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33059  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33060  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33061  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33062  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33063  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33064  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-33065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33066  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-33067  Home windows Process Scheduler Elevation of Privilege Vulnerability 
CVE-2025-33068  Home windows Requirements-Based mostly Storage Administration Service Denial of Service Vulnerability 
CVE-2025-33069  Home windows App Management for Enterprise Safety Characteristic Bypass Vulnerability 
CVE-2025-33073  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-33075  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-47160  Home windows Shortcut Information Safety Characteristic Bypass Vulnerability 
CVE-2025-47955  Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability 
CVE-2025-47956  Home windows Safety App Spoofing Vulnerability 
CVE-2025-47962  Home windows SDK Elevation of Privilege Vulnerability 
CVE-2025-47969  Home windows Virtualization-Based mostly Safety (VBS) Data Disclosure Vulnerability 

 

365 (14 CVEs) 

Important severity 
CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47170  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47173  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47174  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 
CVE-2025-47176  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 

 

Workplace (14 CVEs) 

Important severity 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47170  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47173  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47174  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 
CVE-2025-47176  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 

 

SharePoint (5 CVEs) 

Important severity 
CVE-2025-47172  Microsoft SharePoint Server Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-47163  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47166  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 

 

Visible Studio (2 CVEs) 

Vital severity 
CVE-2025-30399  .NET and Visible Studio Distant Code Execution Vulnerability 
CVE-2025-47959  Visible Studio Distant Code Execution Vulnerability 

Phrase (2 CVEs) 

Vital severity 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 

 

.NET (1 CVE) 

Vital severity 
CVE-2025-30399  .NET and Visible Studio Distant Code Execution Vulnerability 

 

Excel (1 CVE) 

Vital severity 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 

 

Microsoft AutoUpdate for Macintosh (1 CVE) 

Vital severity 
CVE-2025-47968  Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability 

 

Nuance Digital Engagement Platform (1 CVE) 

Vital severity 
CVE-2025-47977  Nuance Digital Engagement Platform Spoofing Vulnerability 

 

Outlook (1 CVE) 

Vital severity 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 

 

PowerPoint (1 CVE) 

Vital severity 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 

 

Appendix D: Advisories and Different Merchandise 

There are 10 Adobe Reader advisories in June’s launch, APSB25-57. Since there’s some selection in severity ranges on this month’s set, we’re together with that info as effectively. 

Important  CVE-2025-43573  Use After Free (CWE-416) 
Important  CVE-2025-43574  Use After Free (CWE-416) 
Important  CVE-2025-43575  Out-of-bounds Write (CWE-787) 
Important  CVE-2025-43576  Use After Free (CWE-416) 
Vital  CVE-2025-43550  Use After Free (CWE-416) 
Vital  CVE-2025-43577  Use After Free (CWE-416) 
Vital  CVE-2025-43578  Out-of-bounds Learn (CWE-125) 
Vital  CVE-2025-47112  Out-of-bounds Learn (CWE-125) 
Average  CVE-2025-43579  Data Publicity (CWE-200) 
Average  CVE-2025-47111  NULL Pointer Dereference (CWE-476) 

 

There are further Microsoft advisories and informational releases that deserve consideration. The Energy Automate patch is attention-grabbing – a Important-severity EoP with a CVSS base rating of 9.8 – however the patch itself was issued practically every week in the past, and so the data introduced beneath is especially FYI. In further, Internet elders are hereby reassured that the “Blink” concerned in CVE-2025-5068 pertains to the Chromium rendering engine, not the erstwhile markup tag greatest described as Devil’s eyelash. 

ADV990001  Newest Servicing Stack Updates 
CVE-2025-5068  Chromium: CVE-2025-5068 Use after free in Blink 
CVE-2025-5419  Chromium: CVE-2025-5419 Out of bounds learn and write in V8 
CVE-2025-47966  Energy Automate Elevation of Privilege Vulnerability 

 

As famous above, on Wednesday Microsoft launched an advisory regarding CVE-2025-32711, “M365 Copilot Data Disclosure Vulnerability,” a Important-severity information-disclosure bug in Copilot. Although technically not included in Patch Tuesday’s haul, we embody acknowledgement of that launch as a courtesy to the reader. 

Appendix E: Affected Home windows Server variations 

It is a desk of the CVEs within the June launch affecting 9 Home windows Server variations, 2008 by means of 2025. The desk differentiates amongst main variations of the platform however doesn’t go into deeper element (eg., Server Core). Important-severity points are marked in pink; an “x” signifies that the CVE doesn’t apply to that model. Directors are inspired to make use of this appendix as a place to begin to determine their particular publicity, as every reader’s state of affairs, particularly because it issues merchandise out of mainstream assist, will differ. For particular Data Base numbers, please seek the advice of Microsoft.  

  2008  2008-R2  2012  2012-R2  2016  2019  2022  2022 23H2  2025 
CVE-2025-24065  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-24068  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-24069  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-29828  ×  ×  ×  ×  ×  ×  ■  ■  ■ 
CVE-2025-3052  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32710  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32712  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32713  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32714  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32715  ×  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32716  ■  ■  ■  ■  ■  ■  ■  ■  × 
CVE-2025-32718  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32719  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-32720  ×  ×  ×  ■  ■  ■  ■  ■  ■ 
CVE-2025-32721  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-32722  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32724  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32725  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33050  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33052  ×  ×  ×  ×  ×  ■  ■  ■  ■ 
CVE-2025-33053  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33055  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33056  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33057  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33058  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33059  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33060  ×  ×  ×  ■  ■  ■  ■  ■  ■ 
CVE-2025-33061  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33062  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33063  ×  ×  ×  ×  ×  ■  ■  ■  ■ 
CVE-2025-33064  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33065  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33066  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33067  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33068  ×  ×  ×  ■  ■  ■  ■  ×  ■ 
CVE-2025-33069  ×  ×  ×  ×  ×  ×  ×  ×  ■ 
CVE-2025-33070  ×  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33071  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33073  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33075  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-47160  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-47955  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-47969  ×  ×  ×  ×  ×  ×  ×  ×  ■ 

 

You might also like

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits


.Microsoft on Tuesday released 67 patches affecting 12 product households. Ten of the addressed points, 5 involving 365 and Workplace and one involving SharePoint, are thought of by Microsoft to be of Critical severity, and 17 have a CVSS base rating of 8.0 or increased. One, an Vital-severity RCE in Home windows associated to WEBDAV (CVE-2025-33053), is identified to be below lively exploitation within the wild. A further Vital-severity SMB subject has been publicly disclosed, however will not be at the moment identified to be below exploit. 

At patch time, 9 further CVEs are extra more likely to be exploited within the subsequent 30 days by the corporate’s estimation, not together with the WEBDAV subject talked about above. Numerous of this month’s points are amenable to direct detection by Sophos protections, and we embody info on those in a desk beneath. This most actually consists of CVE-2025-33053, wherein Sophos itself has taken a specific curiosity – and, apparently, vice versa.

Along with these patches, ten Adobe Reader fixes, 4 of them thought of to be of Important severity, are included within the launch. These are listed in Appendix D beneath. That appendix additionally contains info on two Edge-related vulnerabilities and a Important-severity Energy Automate subject that was addressed earlier this month, in addition to restricted info on a Important-severity bug in Copilot for which an advisory was launched the next day (Wednesday). The periodically launched Servicing Stack updates are additionally out there.  

We’re as at all times together with on the finish of this put up further appendices itemizing all Microsoft’s patches sorted by severity, by predicted exploitability timeline and CVSS Base rating, and by product household; an appendix overlaying the advisory-style updates; and a breakout of the patches affecting the assorted Home windows Server platforms nonetheless in assist.  

By the numbers

  • Whole CVEs: 67
  • Publicly disclosed: 1
  • Exploit detected: 1
  • Severity
    • Important: 10
    • Vital: 57
  • Affect
    • Distant Code Execution: 26
    • Data Disclosure: 17
    • Elevation of Privilege: 13
    • Denial of Service: 6
    • Safety Characteristic Bypass: 3
    • Spoofing: 2
  • CVSS base rating 9.0 or higher: 0*
  • CVSS base rating 8.0 or later: 18

 * One subject, affecting Energy Automate for Desktop however patched by Microsoft on June 5, has been assigned a 9.8 CVSS base rating. Because it was mitigated previous to launch, we’re treating that info as advisory-only and don’t embody it on this month’s statistics. Likewise, the Copilot advisory launched on June 11 has a CVSS base rating of 9.3, however doesn’t determine into these tallies or charts.

A bar chart showing the June 2025 patches sorted by impact and color-coded by severity; information present in text

Determine 1: A proportionally heavier-than-usual ten Important-severity patches have been launched in June,  although unusually six of these happen in 365, Workplace, or SharePoint fairly than the extra customary Home windows. (Two Edge updates coated this month aren’t launched with full impression info and thus don’t seem on this chart; we’re additionally excluding the Energy Automate patch as mentioned above) 

Merchandise 

  • Home windows: 45*
  • 365: 15
  • Workplace: 14
  • SharePoint: 5
  • Visible Studio: 2
  • Phrase: 2
  • .NET: 1
  • Excel: 1
  • Microsoft AutoUpdate for Macintosh: 1
  • Nuance Digital Engagement Platform: 1
  • Outlook: 1
  • PowerPoint: 1

* One Home windows SDK patch (CVE-2025-47962) and one patch affecting the Home windows Safety App part (CVE-2025-47956) are included within the Home windows counts for reader comfort, although neither impacts particular variations of the shopper or server platforms.  

As is our customized for this listing, CVEs that apply to multiple product household are counted as soon as for every household they have an effect on. We word that CVE names don’t at all times replicate affected product households intently. Specifically, some CVEs names within the Workplace household might point out merchandise that don’t seem within the listing of merchandise affected by the CVE, and vice versa.

A bar chart showing the June 2025 patches sorted by product family and color-coded by severity; information in article text

Determine 2: Twelve product households determine in Could’s Patch Tuesday launch; the Nuance medical-product household returns to the charts for a second month, this time addressing a spoofing subject in its Digital Engagement Platform 

Notable June updates 

Along with the problems mentioned above, a number of particular objects benefit consideration.  

CVE-2025-33053 — Internet Distributed Authoring and Versioning (WebDAV) Distant Code Execution Vulnerability 

The one patched subject at the moment identified to be below exploit within the wild is an Vital-severity flaw in Internet Distributed Authoring and Versioning code, which has been underpinning a lot of the web because the IE period. That’s the issue; this patch touches the MSHTML, EdgeHTML, and scripting platforms, that are all nonetheless supported. Because of this these Microsoft prospects at the moment taking Safety Solely updates want to put in the IE Cumulative updates to correctly guard towards this vulnerability – one thing right here for everybody, in different phrases. 

The adversaries exploiting that vulnerability apparently discovered Sophos protections vexing.  Endpoint safety scans new applications earlier than they run—however after launch, scanning drops off. Attackers exploit this by delivering applications with encrypted our bodies that evade static scanning and AI fashions. As soon as working, the code decrypts itself, hundreds implants, and executes completely in reminiscence—by no means touching disk. 

Sophos counters this with Dynamic Shellcode Safety, which limits how a lot executable reminiscence a course of can allocate. That restriction breaks stealthy in-memory assaults, forcing adversaries to revert to noisier, extra detectable methods like distant injection—the place they’re a lot simpler to catch. 

 After that the attackers would have run into a number of extra Sophos layers of blacklist, antimalware signatures, and different defenses — nevertheless it’s fascinating to us to see ourselves mirrored in an adversary’s code as a very powerful nut to crack. In any case, we suggest as at all times that defenders prioritize higher-profile patches reminiscent of this one. 

CVE-2025-33073 – Home windows SMB Consumer Elevation of Privilege Vulnerability 

It’s not identified to be below lively exploitation but, and Microsoft signifies that they assume it’s much less more likely to be exploited throughout the subsequent 30 days, however this Vital-severity EoP is the one June CVE identified to have been publicly disclosed up to now. The problem comes all the way down to improper entry controls, and it impacts all supported Home windows shopper and server variations. 

CVE-2025-47166 — Microsoft SharePoint Server Distant Code Execution Vulnerability 

After debuting in Could, “zcgonvh’s cat Vanilla” makes an instantaneous return look on the finder roster – that’s proper, the cat got here again the very subsequent Patch Tuesday. 

CVE-2025-32711 — M365 Copilot Data Disclosure Vulnerability 

Lastly, one CVE that was not launched within the Tuesday assortment, however merited the discharge of an advisory the next day: a Important-severity, CVSS-base 9.3, information-disclosure error that made it attainable for an unauthorized attacker to make use of command injection to reveal info from the AI software. The vulnerability was responsibly disclosed to Microsoft and the corporate said early Wednesday that the patch is already pushed to prospects.  

A bar chart showing cumulative patch totals, sorted by impact and color-coded by severity, for the patches released so far in 2025

Determine 3: As we wrap up the primary half of the yr, the proportion of Important-severity RCEs over the previous six months is eye-catching 

A bar chart comparing assigned severities during the first halves of 2024 and 2025; highlights covered in text

Determine 4: Evaluating first-half totals for 2024 and 2025, we see that the excessive variety of Important-severity RCEs stands out much more strongly when in comparison with the yr earlier than – 40, in contrast with simply 9 for the primary half of the yr earlier than. A couple of different developments stand out as effectively, together with massive year-over-year will increase in info disclosure CVEs (44 in 1H24, 77 up to now in 2025) and denial of service points (34 in 1H24, 57 up to now in 2025) 

Sophos protections 

CVE  Sophos Intercept X/Endpoint IPS  Sophos XGS Firewall 
CVE-2025-32713  Exp/2532713-A  Exp/2532713-A 
CVE-2025-32714  Exp/2532714-A  Exp/2532714-A 
CVE-2025-33053  sid:2311111  sid:2311111 
CVE-2025-33070  sid:2311128  sid:2311128 
CVE-2025-47162  sid:2311145  sid:2311145 
CVE-2025-47164  sid:2311146  sid:2311146 
CVE-2025-47167  sid:231113  sid:231113 

 

CVE-2025-33053 additionally has an relevant detection of word, Troj/UrlRun-B, along with the XSG signature famous above. 

As you may each month, for those who don’t need to wait on your system to drag down Microsoft’s updates itself, you may obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe software to find out which construct of Home windows 10 or 11 you’re working, then obtain the Cumulative Replace package deal on your particular system’s structure and construct quantity. 

Appendix A: Vulnerability Affect and Severity 

It is a listing of June patches sorted by impression, then sub-sorted by severity. Every listing is additional organized by CVE.  

Distant Code Execution (25 CVEs) 

Important severity 
CVE-2025-29828  Home windows Schannel Distant Code Execution Vulnerability 
CVE-2025-32710  Home windows Distant Desktop Providers Distant Code Execution Vulnerability 
CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47172  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-30399  .NET and Visible Studio Distant Code Execution Vulnerability 
CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
CVE-2025-33064  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-33066  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-47163  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47166  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47170  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47173  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47174  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 
CVE-2025-47176  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47959  Visible Studio Distant Code Execution Vulnerability 

 

Data Disclosure (17 CVEs) 

Vital severity 
CVE-2025-24065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24068  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24069  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32715  Distant Desktop Protocol Consumer Data Disclosure Vulnerability 
CVE-2025-32719  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32720  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32722  Home windows Storage Port Driver Data Disclosure Vulnerability 
CVE-2025-33052  Home windows DWM Core Library Data Disclosure  Vulnerability 
CVE-2025-33055  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33058  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33059  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33060  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33061  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33062  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33063  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-47969  Home windows Virtualization-Based mostly Safety (VBS) Data Disclosure Vulnerability 

 

Elevation of Privilege (13 CVEs) 

Important severity 
CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
Vital severity 
CVE-2025-32712  Win32k Elevation of Privilege Vulnerability 
CVE-2025-32713  Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability 
CVE-2025-32714  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-32716  Home windows Media Elevation of Privilege Vulnerability 
CVE-2025-32718  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-32721  Home windows Restoration Driver Elevation of Privilege Vulnerability 
CVE-2025-33067  Home windows Process Scheduler Elevation of Privilege Vulnerability 
CVE-2025-33073  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-33075  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-47955  Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability 
CVE-2025-47962  Home windows SDK Elevation of Privilege Vulnerability 
CVE-2025-47968  Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability 

 

Denial of Service (6 CVEs) 

Vital severity 
CVE-2025-32724  Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability 
CVE-2025-32725  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33050  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33056  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33057  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33068  Home windows Requirements-Based mostly Storage Administration Service Denial of Service Vulnerability 
CVE-2025-32724  Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability 

 

Safety Characteristic Bypass (3 CVEs) 

Vital severity 
CVE-2025-3052  Cert CC: CVE-2025-3052 InsydeH2O Safe Boot Bypass 
CVE-2025-33069  Home windows App Management for Enterprise Safety Characteristic Bypass Vulnerability 
CVE-2025-47160  Home windows Shortcut Information Safety Characteristic Bypass Vulnerability 

 

Spoofing (2 CVEs) 

Vital severity 
CVE-2025-47956  Home windows Safety App Spoofing Vulnerability 
CVE-2025-47977  Nuance Digital Engagement Platform Spoofing Vulnerability 

 

 

Appendix B: Exploitability and CVSS 

It is a listing of the June CVEs judged by Microsoft to be both below exploitation within the wild or extra more likely to be exploited within the wild throughout the first 30 days post-release. The listing is additional organized by CVE. The three Workplace objects extra more likely to be exploited within the subsequent 30 days (CVE-2025-47162, CVE-2025-47164, and CVE-2025-47167) are all exploitable through Preview Pane. 

Exploitation detected 
CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
Exploitation extra doubtless throughout the subsequent 30 days 
CVE-2025-32713  Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability 
CVE-2025-32714  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47962  Home windows SDK Elevation of Privilege Vulnerability 

 

It is a listing of June’s CVEs with a Microsoft-assessed CVSS Base rating of 8.0 or increased. They’re organized by rating and additional sorted by CVE. For extra info on how CVSS works, please see our collection on patch prioritization schema.  

CVSS Base  CVSS Temporal  CVE  Title 
8.8  8.2  CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-33064  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-33066  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
8.8  7.9  CVE-2025-33073  Home windows SMB Consumer Elevation of Privilege Vulnerability 
8.8  7.7  CVE-2025-47163  Microsoft SharePoint Server Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-47166  Microsoft SharePoint Server Distant Code Execution Vulnerability 
8.8  7.7  CVE-2025-47172  Microsoft SharePoint Server Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-33067  Home windows Process Scheduler Elevation of Privilege Vulnerability 
8.4  7.3  CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
8.4  7.3  CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 
8.1  7.1  CVE-2025-29828  Home windows Schannel Distant Code Execution Vulnerability 
8.1  7.1  CVE-2025-32710  Home windows Distant Desktop Providers Distant Code Execution Vulnerability 
8.1  7.1  CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
8.1  7.1  CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 

 

Appendix C: Merchandise Affected 

It is a listing of June’s patches sorted by product household, then sub-sorted by severity. Every listing is additional organized by CVE. Patches which can be shared amongst a number of product households are listed a number of occasions, as soon as for every product household. Sure important points for which advisories have been issued are coated in Appendix D, and points affecting Home windows Server are additional sorted in Appendix E. All CVE titles are correct as made out there by Microsoft; for additional info on why sure merchandise might seem in titles and never product households (or vice versa), please seek the advice of Microsoft. 

Home windows (45 CVEs) 

Important severity 
CVE-2025-29828  Home windows Schannel Distant Code Execution Vulnerability 
CVE-2025-32710  Home windows Distant Desktop Providers Distant Code Execution Vulnerability 
CVE-2025-33070  Home windows Netlogon Elevation of Privilege Vulnerability 
CVE-2025-33071  Home windows KDC Proxy Service (KPSSVC) Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-3052  Cert CC: CVE-2025-3052 InsydeH2O Safe Boot Bypass 
CVE-2025-24065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24068  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-24069  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32712  Win32k Elevation of Privilege Vulnerability 
CVE-2025-32713  Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability 
CVE-2025-32714  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-32715  Distant Desktop Protocol Consumer Data Disclosure Vulnerability 
CVE-2025-32716  Home windows Media Elevation of Privilege Vulnerability 
CVE-2025-32718  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-32719  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32720  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-32721  Home windows Restoration Driver Elevation of Privilege Vulnerability 
CVE-2025-32722  Home windows Storage Port Driver Data Disclosure Vulnerability 
CVE-2025-32724  Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability 
CVE-2025-32725  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33050  DHCP Server Service Denial of Service Vulnerability 
CVE-2025-33052  Home windows DWM Core Library Data Disclosure  Vulnerability 
CVE-2025-33053  Internet Distributed Authoring and Versioning (WEBDAV) Distant Code Execution Vulnerability 
CVE-2025-33055  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33056  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33057  Home windows Native Safety Authority (LSA) Denial of Service Vulnerability 
CVE-2025-33058  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33059  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33060  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33061  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33062  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33063  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33064  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-33065  Home windows Storage Administration Supplier Data Disclosure Vulnerability 
CVE-2025-33066  Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability 
CVE-2025-33067  Home windows Process Scheduler Elevation of Privilege Vulnerability 
CVE-2025-33068  Home windows Requirements-Based mostly Storage Administration Service Denial of Service Vulnerability 
CVE-2025-33069  Home windows App Management for Enterprise Safety Characteristic Bypass Vulnerability 
CVE-2025-33073  Home windows SMB Consumer Elevation of Privilege Vulnerability 
CVE-2025-33075  Home windows Installer Elevation of Privilege Vulnerability 
CVE-2025-47160  Home windows Shortcut Information Safety Characteristic Bypass Vulnerability 
CVE-2025-47955  Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability 
CVE-2025-47956  Home windows Safety App Spoofing Vulnerability 
CVE-2025-47962  Home windows SDK Elevation of Privilege Vulnerability 
CVE-2025-47969  Home windows Virtualization-Based mostly Safety (VBS) Data Disclosure Vulnerability 

 

365 (14 CVEs) 

Important severity 
CVE-2025-32717  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47170  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47173  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47174  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 
CVE-2025-47176  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 

 

Workplace (14 CVEs) 

Important severity 
CVE-2025-47162  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47164  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47167  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47953  Microsoft Workplace Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47170  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47173  Microsoft Workplace Distant Code Execution Vulnerability 
CVE-2025-47174  Microsoft Excel Distant Code Execution Vulnerability 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 
CVE-2025-47176  Microsoft Outlook Distant Code Execution Vulnerability 
CVE-2025-47957  Microsoft Phrase Distant Code Execution Vulnerability 

 

SharePoint (5 CVEs) 

Important severity 
CVE-2025-47172  Microsoft SharePoint Server Distant Code Execution Vulnerability 
Vital severity 
CVE-2025-47163  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47166  Microsoft SharePoint Server Distant Code Execution Vulnerability 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 

 

Visible Studio (2 CVEs) 

Vital severity 
CVE-2025-30399  .NET and Visible Studio Distant Code Execution Vulnerability 
CVE-2025-47959  Visible Studio Distant Code Execution Vulnerability 

Phrase (2 CVEs) 

Vital severity 
CVE-2025-47168  Microsoft Phrase Distant Code Execution Vulnerability 
CVE-2025-47169  Microsoft Phrase Distant Code Execution Vulnerability 

 

.NET (1 CVE) 

Vital severity 
CVE-2025-30399  .NET and Visible Studio Distant Code Execution Vulnerability 

 

Excel (1 CVE) 

Vital severity 
CVE-2025-47165  Microsoft Excel Distant Code Execution Vulnerability 

 

Microsoft AutoUpdate for Macintosh (1 CVE) 

Vital severity 
CVE-2025-47968  Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability 

 

Nuance Digital Engagement Platform (1 CVE) 

Vital severity 
CVE-2025-47977  Nuance Digital Engagement Platform Spoofing Vulnerability 

 

Outlook (1 CVE) 

Vital severity 
CVE-2025-47171  Microsoft Outlook Distant Code Execution Vulnerability 

 

PowerPoint (1 CVE) 

Vital severity 
CVE-2025-47175  Microsoft PowerPoint Distant Code Execution Vulnerability 

 

Appendix D: Advisories and Different Merchandise 

There are 10 Adobe Reader advisories in June’s launch, APSB25-57. Since there’s some selection in severity ranges on this month’s set, we’re together with that info as effectively. 

Important  CVE-2025-43573  Use After Free (CWE-416) 
Important  CVE-2025-43574  Use After Free (CWE-416) 
Important  CVE-2025-43575  Out-of-bounds Write (CWE-787) 
Important  CVE-2025-43576  Use After Free (CWE-416) 
Vital  CVE-2025-43550  Use After Free (CWE-416) 
Vital  CVE-2025-43577  Use After Free (CWE-416) 
Vital  CVE-2025-43578  Out-of-bounds Learn (CWE-125) 
Vital  CVE-2025-47112  Out-of-bounds Learn (CWE-125) 
Average  CVE-2025-43579  Data Publicity (CWE-200) 
Average  CVE-2025-47111  NULL Pointer Dereference (CWE-476) 

 

There are further Microsoft advisories and informational releases that deserve consideration. The Energy Automate patch is attention-grabbing – a Important-severity EoP with a CVSS base rating of 9.8 – however the patch itself was issued practically every week in the past, and so the data introduced beneath is especially FYI. In further, Internet elders are hereby reassured that the “Blink” concerned in CVE-2025-5068 pertains to the Chromium rendering engine, not the erstwhile markup tag greatest described as Devil’s eyelash. 

ADV990001  Newest Servicing Stack Updates 
CVE-2025-5068  Chromium: CVE-2025-5068 Use after free in Blink 
CVE-2025-5419  Chromium: CVE-2025-5419 Out of bounds learn and write in V8 
CVE-2025-47966  Energy Automate Elevation of Privilege Vulnerability 

 

As famous above, on Wednesday Microsoft launched an advisory regarding CVE-2025-32711, “M365 Copilot Data Disclosure Vulnerability,” a Important-severity information-disclosure bug in Copilot. Although technically not included in Patch Tuesday’s haul, we embody acknowledgement of that launch as a courtesy to the reader. 

Appendix E: Affected Home windows Server variations 

It is a desk of the CVEs within the June launch affecting 9 Home windows Server variations, 2008 by means of 2025. The desk differentiates amongst main variations of the platform however doesn’t go into deeper element (eg., Server Core). Important-severity points are marked in pink; an “x” signifies that the CVE doesn’t apply to that model. Directors are inspired to make use of this appendix as a place to begin to determine their particular publicity, as every reader’s state of affairs, particularly because it issues merchandise out of mainstream assist, will differ. For particular Data Base numbers, please seek the advice of Microsoft.  

  2008  2008-R2  2012  2012-R2  2016  2019  2022  2022 23H2  2025 
CVE-2025-24065  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-24068  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-24069  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-29828  ×  ×  ×  ×  ×  ×  ■  ■  ■ 
CVE-2025-3052  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32710  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32712  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32713  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32714  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32715  ×  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32716  ■  ■  ■  ■  ■  ■  ■  ■  × 
CVE-2025-32718  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32719  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-32720  ×  ×  ×  ■  ■  ■  ■  ■  ■ 
CVE-2025-32721  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-32722  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32724  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-32725  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33050  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33052  ×  ×  ×  ×  ×  ■  ■  ■  ■ 
CVE-2025-33053  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33055  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33056  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33057  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33058  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33059  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33060  ×  ×  ×  ■  ■  ■  ■  ■  ■ 
CVE-2025-33061  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33062  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33063  ×  ×  ×  ×  ×  ■  ■  ■  ■ 
CVE-2025-33064  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33065  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33066  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33067  ×  ×  ×  ×  ■  ■  ■  ■  ■ 
CVE-2025-33068  ×  ×  ×  ■  ■  ■  ■  ×  ■ 
CVE-2025-33069  ×  ×  ×  ×  ×  ×  ×  ×  ■ 
CVE-2025-33070  ×  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33071  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33073  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-33075  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-47160  ×  ×  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-47955  ■  ■  ■  ■  ■  ■  ■  ■  ■ 
CVE-2025-47969  ×  ×  ×  ×  ×  ×  ×  ×  ■ 

 

Tags: bugsdigsJuneNewsPatchSophosTuesday
Previous Post

High 5 SASE Options for Fashionable Enterprise Safety

Next Post

Full Router Information for Gaming

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters
Cyber Security

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters

by Md Sazzad Hossain
July 17, 2025
The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

by Md Sazzad Hossain
July 17, 2025
How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits
Cyber Security

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

by Md Sazzad Hossain
July 16, 2025
How India’s DPDP Act Impacts Digital Lending
Cyber Security

How India’s DPDP Act Impacts Digital Lending

by Md Sazzad Hossain
July 16, 2025
MITRE Launches New Framework to Sort out Crypto Dangers
Cyber Security

MITRE Launches New Framework to Sort out Crypto Dangers

by Md Sazzad Hossain
July 15, 2025
Next Post
Full Router Information for Gaming

Full Router Information for Gaming

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

The Period of Microperimeters

The Period of Microperimeters

February 9, 2025
5 Methods to Cease Privilege Escalation Assaults

5 Methods to Cease Privilege Escalation Assaults

May 9, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

NVIDIA AI Releases Canary-Qwen-2.5B: A State-of-the-Artwork ASR-LLM Hybrid Mannequin with SoTA Efficiency on OpenASR Leaderboard

NVIDIA AI Releases Canary-Qwen-2.5B: A State-of-the-Artwork ASR-LLM Hybrid Mannequin with SoTA Efficiency on OpenASR Leaderboard

July 18, 2025
How Geospatial Evaluation is Revolutionizing Emergency Response

How Geospatial Evaluation is Revolutionizing Emergency Response

July 17, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In