Microsoft’s June 2025 Patch Tuesday has arrived, delivering urgent security fixes for a broad range of its products. The company addressed more than 65 vulnerabilities, including a zero-day exploit that was being actively used in cyber espionage campaigns. This month’s updates are critical for both enterprise and individual users, reinforcing the importance of timely patching to protect against emerging threats.
Microsoft Patch Tuesday at a Glance
This month’s security release is notable for its breadth and the severity of the vulnerabilities addressed. Microsoft has fixed at least 65 security flaws (CVEs), with some sources reporting up to 67, depending on the counting methodology and inclusion of third-party patches. Of these, approximately 9 to 11 are rated Critical, and the rest are classified as Important in severity.
The standout fix is for CVE-2025-33053, a remote code execution (RCE) vulnerability in the WebDAV (Web Distributed Authoring and Versioning) component of Windows. This flaw was being actively exploited by the advanced persistent threat (APT) group known as Stealth Falcon (also called FruityArmor), which has a history of leveraging Windows zero-days for espionage purposes.
The Zero-Day Threat: CVE-2025-33053
CVE-2025-33053 is a remote code execution vulnerability in WebDAV, a protocol designed to extend HTTP for file management. While WebDAV has been deprecated since 2023 and is not enabled by default, Microsoft has chosen to patch the flaw across both current and legacy Windows and Windows Server versions, including some that are officially out of support.
The vulnerability has been exploited in real-world attacks, most notably in March 2025, when Stealth Falcon targeted a major defense organization in Turkey. The attack began with a phishing email containing a malicious .url
file disguised as a PDF document related to military equipment damage. When executed, the file exploited the zero-day to launch malware from an attacker-controlled WebDAV server.
Attack Chain Details:
-
Delivery: Phishing email with a .url file disguised as a PDF.
-
Execution: The victim clicks the file, triggering the exploit.
-
Exploitation: The exploit manipulates the Windows file execution search order, tricking a legitimate Windows utility (iediagcmd.exe, an Internet Explorer diagnostics tool) into executing malicious code hosted on a remote server.
-
Payload: The attack delivers the Horus Agent, a custom-built implant designed for the Mythic command-and-control (C2) framework.
-
Evasion: Attackers use techniques like string encryption and control flow flattening to complicate analysis and avoid detection.
This approach allows attackers to execute code remotely without dropping files directly onto the victim’s machine, making detection more challenging.
Other Critical Vulnerabilities and Risk Analysis
Beyond the zero-day, Microsoft patched several other critical vulnerabilities. Remote code execution (RCE) flaws were the most prominent, accounting for about 38% of the total patches1. Other risk types included information disclosure (26%) and elevation of privilege (20%).
Breakdown of Vulnerability Types:
-
Remote Code Execution (RCE): 25–26 patches (38–39% of total)
-
Information Disclosure: 17 patches (26%)
-
Elevation of Privilege: 13–14 patches (20%)
-
Denial of Service: 6 patches
-
Security Feature Bypass: 3 patches
-
Spoofing: 2 patches
These vulnerabilities affect a wide range of Microsoft products, including Windows, Office, .NET, Visual Studio, SharePoint, Microsoft Edge, Power Automate, and more.
Affected Products and Components
Windows and Windows Components:
The majority of the vulnerabilities are in Windows and its core components, including the kernel, shell, and various services. Both Windows 10 and Windows 11 are affected, along with related server versions.
Microsoft Office:
Four critical vulnerabilities were patched in Office, making it a continued target for attackers who use malicious documents to deliver payloads via email.
Other Products:
Patches were also released for:
-
.NET and Visual Studio
-
Microsoft Edge (Chromium-based)
-
Power Automate
-
Nuance Digital Engagement Platform
-
Windows Cryptographic Services
-
Windows Hello
-
Windows Installer
-
Windows Kernel
-
Windows Local Security Authority (LSA)
-
Windows Media
-
Windows Netlogon
-
Windows Remote Desktop Services
-
Windows SMB
Notable Vulnerabilities and Exploitation
- CVE-2025-33053: As discussed, this is the most urgent vulnerability to patch due to its active exploitation. Microsoft has even released patches for out-of-support operating systems, underscoring the severity of the threat.
- Other Critical RCEs: Several other critical RCE vulnerabilities were patched, including in Office components. These are often exploited via malicious documents, making them a favorite vector for phishing campaigns.
- Elevation of Privilege and Information Disclosure: These vulnerabilities could allow attackers to gain higher privileges on a system or access sensitive information, respectively. While not always exploited in the wild, they are frequently targeted in advanced attacks.
The Unpatched Vulnerability: BadSuccessor
Despite the extensive coverage, one notable vulnerability remains unpatched this month: BadSuccessor. This flaw affects Windows Server 2025 domain controllers and could have significant implications for enterprise environments. Microsoft has not provided a timeline for a fix, so organizations are advised to monitor for updates and apply mitigations if available.
Patch Tuesday: What You Need to Do
Given the severity and active exploitation of CVE-2025-33053, it is critical for all users—especially enterprises—to apply the June 2025 Patch Tuesday updates as soon as possible. Here are the recommended steps:
-
Apply All Available Updates:
-
Use Windows Update to install the latest security patches for Windows, Office, and other affected products.
-
For enterprise environments, deploy updates through your patch management system.
-
-
Prioritize Critical Systems:
-
Focus on systems that are exposed to the internet or handle sensitive data.
-
Ensure domain controllers, file servers, and endpoints are updated promptly.
-
-
Monitor for Unpatched Vulnerabilities:
-
Keep an eye on the status of BadSuccessor and other unpatched vulnerabilities.
-
Apply mitigations or workarounds if recommended by Microsoft.
-
-
Educate Users:
-
Remind users to be cautious with email attachments and links, especially those that appear to be documents or PDFs.
-
Conduct regular security awareness training to reduce the risk of phishing.
-
Cybersecurity
The June 2025 Patch Tuesday highlights several ongoing trends in cybersecurity:
-
Zero-Day Exploits Are Increasingly Common:
Attackers are leveraging zero-day vulnerabilities to target high-value organizations, often using sophisticated tactics to evade detection. -
Legacy Systems Remain at Risk:
Even deprecated components like WebDAV can be exploited if not properly secured or removed. -
Phishing Remains a Primary Attack Vector:
Many critical vulnerabilities are exploited through phishing campaigns, underscoring the need for robust email security and user education.
Detailed Technical Overview
For those interested in the technical specifics, here is a deeper dive into the key vulnerabilities and their impact:
- CVE-2025-33053 – WebDAV RCE: This vulnerability allows an attacker to execute arbitrary code on a victim’s system by tricking them into opening a specially crafted .url file. The exploit leverages the Windows file execution search order to load malicious code from a remote WebDAV server, using a legitimate Windows utility as a conduit. This technique is highly effective at bypassing traditional security controls, as it does not require the attacker to drop files on the victim’s machine.
- Critical Office Vulnerabilities: Four critical RCE vulnerabilities in Office were patched. These are typically exploited via malicious documents, such as Word or Excel files, which are delivered via email. Once opened, the documents execute malicious code, often leading to full system compromise.
- Elevation of Privilege and Information Disclosure: These vulnerabilities allow attackers to gain higher privileges or access sensitive information, respectively. They are often used in combination with other exploits to escalate attacks within a network.
Enterprise Impact and Recommendations
For enterprise IT teams, this month’s Patch Tuesday is a reminder of the importance of a robust patch management strategy. Key recommendations include:
-
Automate Patch Deployment:
Use automated tools to ensure all systems are updated promptly. -
Monitor for Exploits:
Implement threat intelligence feeds to stay informed about active exploits and emerging threats. -
Segment Networks: Limit the spread of potential attacks by segmenting networks and restricting lateral movement.
-
Regularly Audit Systems: Ensure that all systems are up to date and that deprecated components are removed or disabled.
Microsoft’s June 2025 Patch Tuesday is a critical security event, addressing over 65 vulnerabilities—including a zero-day exploit that was actively used in cyber espionage. The updates cover a wide range of products, from Windows and Office to .NET and SharePoint, and are essential for protecting against both known and emerging threats.
The active exploitation of CVE-2025-33053 underscores the need for immediate action, especially for enterprises and organizations handling sensitive data. While most vulnerabilities have been patched, the unpatched BadSuccessor flaw in Windows Server 2025 domain controllers remains a concern.
By staying vigilant, applying updates promptly, and educating users, organizations can significantly reduce their risk of falling victim to these and future threats. As always, Microsoft’s Patch Tuesday serves as a reminder of the ever-evolving landscape of cybersecurity and the importance of proactive defense.
To access the full description of each vulnerability and the systems it affects, check this chart below.
Tag | CVE ID | CVE Title | Severity |
---|---|---|---|
.NET and Visual Studio | CVE-2025-30399 | .NET and Visual Studio Remote Code Execution Vulnerability | Important |
App Control for Business (WDAC) | CVE-2025-33069 | Windows App Control for Business Security Feature Bypass Vulnerability | Important |
Microsoft AutoUpdate (MAU) | CVE-2025-47968 | Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability | Important |
Microsoft Local Security Authority Server (lsasrv) | CVE-2025-33056 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | Important |
Microsoft Office | CVE-2025-47164 | Microsoft Office Remote Code Execution Vulnerability | Critical |
Microsoft Office | CVE-2025-47167 | Microsoft Office Remote Code Execution Vulnerability | Critical |
Microsoft Office | CVE-2025-47162 | Microsoft Office Remote Code Execution Vulnerability | Critical |
Microsoft Office | CVE-2025-47173 | Microsoft Office Remote Code Execution Vulnerability | Important |
Microsoft Office | CVE-2025-47953 | Microsoft Office Remote Code Execution Vulnerability | Critical |
Microsoft Office Excel | CVE-2025-47165 | Microsoft Excel Remote Code Execution Vulnerability | Important |
Microsoft Office Excel | CVE-2025-47174 | Microsoft Excel Remote Code Execution Vulnerability | Important |
Microsoft Office Outlook | CVE-2025-47171 | Microsoft Outlook Remote Code Execution Vulnerability | Important |
Microsoft Office Outlook | CVE-2025-47176 | Microsoft Outlook Remote Code Execution Vulnerability | Important |
Microsoft Office PowerPoint | CVE-2025-47175 | Microsoft PowerPoint Remote Code Execution Vulnerability | Important |
Microsoft Office SharePoint | CVE-2025-47172 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Critical |
Microsoft Office SharePoint | CVE-2025-47166 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Important |
Microsoft Office SharePoint | CVE-2025-47163 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Important |
Microsoft Office Word | CVE-2025-47170 | Microsoft Word Remote Code Execution Vulnerability | Important |
Microsoft Office Word | CVE-2025-47957 | Microsoft Word Remote Code Execution Vulnerability | Important |
Microsoft Office Word | CVE-2025-47169 | Microsoft Word Remote Code Execution Vulnerability | Important |
Microsoft Office Word | CVE-2025-47168 | Microsoft Word Remote Code Execution Vulnerability | Important |
Nuance Digital Engagement Platform | CVE-2025-47977 | Nuance Digital Engagement Platform Spoofing Vulnerability | Important |
Remote Desktop Client | CVE-2025-32715 | Remote Desktop Protocol Client Information Disclosure Vulnerability | Important |
Visual Studio | CVE-2025-47959 | Visual Studio Remote Code Execution Vulnerability | Important |
WebDAV | CVE-2025-33053 | Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability | Important |
Windows Common Log File System Driver | CVE-2025-32713 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important |
Windows Cryptographic Services | CVE-2025-29828 | Windows Schannel Remote Code Execution Vulnerability | Critical |
Windows DHCP Server | CVE-2025-33050 | DHCP Server Service Denial of Service Vulnerability | Important |
Windows DHCP Server | CVE-2025-32725 | DHCP Server Service Denial of Service Vulnerability | Important |
Windows DWM Core Library | CVE-2025-33052 | Windows DWM Core Library Information Disclosure Vulnerability | Important |
Windows Hello | CVE-2025-47969 | Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability | Important |
Windows Installer | CVE-2025-33075 | Windows Installer Elevation of Privilege Vulnerability | Important |
Windows Installer | CVE-2025-32714 | Windows Installer Elevation of Privilege Vulnerability | Important |
Windows KDC Proxy Service (KPSSVC) | CVE-2025-33071 | Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability | Critical |
Windows Kernel | CVE-2025-33067 | Windows Task Scheduler Elevation of Privilege Vulnerability | Important |
Windows Local Security Authority (LSA) | CVE-2025-33057 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | Important |
Windows Local Security Authority Subsystem Service (LSASS) | CVE-2025-32724 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | Important |
Windows Media | CVE-2025-32716 | Windows Media Elevation of Privilege Vulnerability | Important |
Windows Netlogon | CVE-2025-33070 | Windows Netlogon Elevation of Privilege Vulnerability | Critical |
Windows Recovery Driver | CVE-2025-32721 | Windows Recovery Driver Elevation of Privilege Vulnerability | Important |
Windows Remote Access Connection Manager | CVE-2025-47955 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Important |
Windows Remote Desktop Services | CVE-2025-32710 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Critical |
Windows Routing and Remote Access Service (RRAS) | CVE-2025-33064 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
Windows Routing and Remote Access Service (RRAS) | CVE-2025-33066 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
Windows SDK | CVE-2025-47962 | Windows SDK Elevation of Privilege Vulnerability | Important |
Windows Secure Boot | CVE-2025-3052 | Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass | Important |
Windows Security App | CVE-2025-47956 | Windows Security App Spoofing Vulnerability | Important |
Windows Shell | CVE-2025-47160 | Windows Shortcut Files Security Feature Bypass Vulnerability | Important |
Windows SMB | CVE-2025-33073 | Windows SMB Client Elevation of Privilege Vulnerability | Important |
Windows SMB | CVE-2025-32718 | Windows SMB Client Elevation of Privilege Vulnerability | Important |
Windows Standards-Based Storage Management Service | CVE-2025-33068 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-32719 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-24065 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-24068 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33055 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-24069 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33060 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33059 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33062 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33061 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33058 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-32720 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33065 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Management Provider | CVE-2025-33063 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
Windows Storage Port Driver | CVE-2025-32722 | Windows Storage Port Driver Information Disclosure Vulnerability | Important |
Windows Win32K – GRFX | CVE-2025-32712 | Win32k Elevation of Privilege Vulnerability | Important |
Discover more from Microsoft News Today
Subscribe to get the latest posts sent to your email.