Reading view

There are new articles available, click to refresh the page.

Patch Tuesday - June 2025

Patch Tuesday - June 2025

Microsoft is addressing 67 vulnerabilities this June 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for just one of the vulnerabilities published today, and that is reflected in CISA KEV. Separately, Microsoft is aware of existing public disclosure for one other freshly published vulnerability. Microsoft’s luck holds for a ninth consecutive Patch Tuesday, since neither of today’s zero-day vulnerabilities are evaluated as critical severity at time of publication. Today also sees the publication of eight critical remote code execution (RCE) vulnerabilities. Two browser vulnerabilities have already been published separately this month, and are not included in the total.

Windows WebDAV: zero-day RCE

Remember the WebDAV standard? It has been seven years since Microsoft has published a vulnerability in the Windows implementation of WebDAV, and today’s publication of CVE-2025-33053 is the first zero-day vulnerability on record. Originally dreamed up in the 1990s to support interactivity on the web, WebDAV may be familiar to Exchange admins and users of a certain vintage, since older versions of Exchange, up to and including Exchange Server 2010, supported WebDAV as a means for interacting with mailboxes and public folders.

It will surprise no one that Windows still more or less supports WebDAV, and that turns out to be a bit of a problem. Microsoft acknowledges Check Point Research (CPR) on the advisory; CPR in turn attributes exploitation of CVE-2025-33053 to an APT, which they track as Stealth Falcon, an established threat actor with a long-running interest in governments and government-adjacent entities across the Middle East and the surrounding area.

Curiously, the Microsoft advisory does not mention that the Windows implementation of WebDAV is listed as deprecated since November 2023, which in practical terms means that the WebClient service no longer starts by default. The advisory also has attack complexity as low, which means that exploitation does not require preparation of the target environment in any way that is beyond the attacker’s control. Exploitation relies on the user clicking a malicious link. It’s not clear how an asset would be immediately vulnerable if the service isn’t running, but all versions of Windows receive a patch, including those released since the deprecation of WebClient, like Server 2025 and Windows 11 24H2. On Server 2025, for instance, it’s still possible to install the WebDAV Redirector server feature, which then causes the WebClient service to appear.

SMB client: zero-day EoP

Publicly disclosed elevation of privilege (EoP) zero-day vulnerabilities that lead to SYSTEM are always going to be worth a closer look, and CVE-2025-33073 is no exception. The advisory sets out that the easiest path to exploitation simply requires the user to connect to a malicious SMB server controlled by the attacker. It’s not entirely clear from the advisory whether simply connecting is enough to trigger exploitation, or whether successful authentication is required, since there is currently conflicting language in two separate FAQ entries with almost-identical titles: “How could an attacker exploit this/the vulnerability?” It may well be that Microsoft will come back around and clarify this wording, but in the meantime the only safe assumption is that fortune favours the attacker.

Windows KDC Proxy: critical RCE

The Windows KDC Proxy Service (KPSSVC) receives a patch today for CVE-2025-33071, which describes a critical unauthenticated RCE vulnerability where exploitation is via abuse of a cryptographic protocol weakness. The good news is that only Windows Server assets configured as a Kerberos Key Distribution Center Proxy Protocol server — happily, this is not enabled as standard configuration for a domain controller — and exploitation requires that the attacker win a race condition. The bad news is that Microsoft considers exploitation more likely regardless, and since a KDC proxy helps Kerberos requests from untrusted networks more easily access trusted assets without any need for a direct TCP connection from the client to the domain controller, the trade-off here is that the KDC proxy itself is quite likely to be exposed to an untrusted network. Patching this vulnerability should be top of mind for affected defenders this month.

Office preview pane: trio of critical RCEs

Microsoft expects that exploitation of three Office critical RCE vulns patched today is more likely. CVE-2025-47162, CVE-2025-47164, and CVE-2025-47167 share several attributes: each was discovered by prolific researcher 0x140ce, who topped the MSRC 2025 Q1 leaderboard, and each includes the Preview Pane as a vector, which always ups the ante for defenders. Admins responsible for installations of Microsoft 365 Apps for Enterprise — also confusingly referred to as “Microsoft 365 for Office” in the advisory FAQ — will have to hang on, since patches for today’s vulnerabilities aren’t yet available for that particular facet of the Microsoft 365 kaleidoscope.

Microsoft lifecycle update

June is a quiet month for Microsoft product lifecycle changes. The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when the SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.

Patch Tuesday - June 2025
Patch Tuesday - June 2025
Patch Tuesday - June 2025

Summary tables

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47977 Nuance Digital Engagement Platform Spoofing Vulnerability No No 7.6

Browser vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-5419 Chromium: CVE-2025-5419 Out of bounds read and write in V8 No No N/A
CVE-2025-5068 Chromium: CVE-2025-5068 Use after free in Blink No No N/A

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47962 Windows SDK Elevation of Privilege Vulnerability No No 7.8
CVE-2025-30399 .NET and Visual Studio Remote Code Execution Vulnerability No No 7.5
CVE-2025-47959 Visual Studio Remote Code Execution Vulnerability No No 7.1

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47966 Power Automate Elevation of Privilege Vulnerability No No 9.8

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47172 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-47163 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-47166 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-47957 Microsoft Word Remote Code Execution Vulnerability No No 8.4
CVE-2025-47162 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47953 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47164 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47167 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47168 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-47169 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-47170 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-47175 Microsoft PowerPoint Remote Code Execution Vulnerability No No 7.8
CVE-2025-47176 Microsoft Outlook Remote Code Execution Vulnerability No No 7.8
CVE-2025-47173 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-47165 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-47174 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-47968 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability No No 7.8
CVE-2025-47171 Microsoft Outlook Remote Code Execution Vulnerability No No 6.7

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-33067 Windows Task Scheduler Elevation of Privilege Vulnerability No No 8.4
CVE-2025-29828 Windows Schannel Remote Code Execution Vulnerability No No 8.1
CVE-2025-32725 DHCP Server Service Denial of Service Vulnerability No No 7.5
CVE-2025-33050 DHCP Server Service Denial of Service Vulnerability No No 7.5
CVE-2025-32721 Windows Recovery Driver Elevation of Privilege Vulnerability No No 7.3
CVE-2025-32719 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33058 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33059 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33061 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33062 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33063 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33065 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-24068 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-24069 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-24065 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33055 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-47956 Windows Security App Spoofing Vulnerability No No 5.5
CVE-2025-33052 Windows DWM Core Library Information Disclosure Vulnerability No No 5.5
CVE-2025-33069 Windows App Control for Business Security Feature Bypass Vulnerability No No 5.1
CVE-2025-47969 Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability No No 4.4

Windows ESU vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-33073 Windows SMB Client Elevation of Privilege Vulnerability No Yes 8.8
CVE-2025-33064 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 8.8
CVE-2025-33066 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 8.8
CVE-2025-33053 Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability Yes No 8.8
CVE-2025-32710 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-33070 Windows Netlogon Elevation of Privilege Vulnerability No No 8.1
CVE-2025-33071 Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability No No 8.1
CVE-2025-32718 Windows SMB Client Elevation of Privilege Vulnerability No No 7.8
CVE-2025-47955 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32716 Windows Media Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32714 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-33075 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32713 Windows Common Log File System Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32712 Win32k Elevation of Privilege Vulnerability No No 7.8
CVE-2025-33068 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-33056 Windows Local Security Authority (LSA) Denial of Service Vulnerability No No 7.5
CVE-2025-32724 Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability No No 7.5
CVE-2025-3052 Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass No No 6.7
CVE-2025-33057 Windows Local Security Authority (LSA) Denial of Service Vulnerability No No 6.5
CVE-2025-32715 Remote Desktop Protocol Client Information Disclosure Vulnerability No No 6.5
CVE-2025-32722 Windows Storage Port Driver Information Disclosure Vulnerability No No 5.5
CVE-2025-32720 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33060 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-47160 Windows Shortcut Files Security Feature Bypass Vulnerability No No 5.4

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now

Patch Tuesday - May 2025

Patch Tuesday - May 2025

Microsoft is addressing 77 vulnerabilities this May 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for five of the vulnerabilities published today, and these are already reflected in CISA KEV. Separately, Microsoft is aware of existing public disclosure for two vulnerabilities published today. This is now the eighth consecutive Patch Tuesday on which Microsoft has published zero-day vulnerabilities without evaluating any of them as critical severity at time of publication. Today also sees the publication of six critical remote code execution (RCE) vulnerabilities. Six browser vulnerabilities have already been published separately this month, and are not included in the total.

Windows Scripting Engine: zero-day RCE

In the majority of cases, the CVSSv3 base score provides a solid sense of the severity of a vulnerability. Sometimes, however, even a correct CVSS assessment can disguise the potential impact of a specific vulnerability. This is arguably the case with CVE-2025-30397, a zero-day RCE vulnerability in the Windows Scripting Engine with a healthy but unremarkable CVSSv3 base score of 7.5. Microsoft is aware of exploitation in the wild. It’s certainly not the worst of the worst — we save that level of alarm for pre-authentication RCE with no requirement for user interaction —  and Microsoft very reasonably assesses attack complexity as high. And yet…

The advisory FAQ for CVE-2025-30397 explains that successful exploitation requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode, and then causes the user to click a malicious link; there is no mention of a requirement for the user to actively reload the page in Internet Explorer Mode, so we must assume that exploitation requires only that the “Allow sites to be reloaded in Internet Explorer” option is enabled. Users who are most likely to require Internet Explorer compatibility mode in 2025 are surely users at enterprise organizations, where critical business workflows still depend on applications from the dinosaur days when Internet Explorer ruled the roost. No doubt the concept of a plan for migration of all of these applications exists, buried several layers deep in a dusty backlog, but Microsoft would hardly be offering IE compatibility mode until at least 2029 if it didn’t know that a huge swathe of its customer base demands it.

If the pre-requisite conditions are already conveniently in place on the target asset thanks to a well-meaning corporate IT policy, attack complexity is suddenly nice and low. If this vulnerability didn’t have that requirement for environment preparation, the CVSS base score would then be 8.8, which is as close to critical as you can get without actually stepping over the line. As Rapid7 has previously noted on a number of occasions, the MSHTML/Trident scripting engine is still present in Windows; this is true even for assets which have only ever run versions of Windows released well after the end of support for Internet Explorer 11 back in June 2022.

Common Log File System: zero-day EoPs

CVE-2025-32701 and CVE-2025-32706 are far from the first zero-day vulnerabilities in the Windows Common Log File System (CLFS) driver; indeed, they are the latest members of an ongoing dynasty where exploitation typically leads to elevation of privilege to SYSTEM. Credit where credit is due: recent disclosures by Microsoft’s own Threat Intelligence Center (MSTIC), including this month’s CVE-2025-32701, demonstrate that Microsoft is putting serious effort into detecting and rooting out CLFS exploitation. Of course, since Microsoft is aware of exploitation in the wild, we know that someone else got there first, and there’s no reason to suspect that threat actors will stop looking for ways to abuse CLFS any time soon.

Windows Desktop Window Manager: zero-day EoP

If proof were needed that elevation of privilege to SYSTEM will never go out of style, today sees the publication of CVE-2025-30400, which is a zero-day vulnerability in the Windows Desktop Window Manager (DWM). As it happens, tomorrow marks the one-year anniversary of CVE-2024-30051, a previous zero-day EoP vulnerability in DWM.

Visual Studio: zero-day RCE

Today, all current versions of Visual Studio 2022 and 2019 receive patches for CVE-2025-32702, a zero-day RCE where exploitation requires the user to download and open a malicious file. There is nothing obviously remarkable about this, although Microsoft is aware of public disclosure. As usual for a malicious file/link vuln, the word Remote here refers to the location of the attacker, even though exploitation is set in motion by local user action.

Ancillary Function Driver for Winsock: zero-day EoP

Regular Patch Tuesday watchers will recognize the Ancillary Function Driver for Winsock, which is the site of CVE-2025-32709, an elevation of privilege vulnerability for which Microsoft is aware of exploitation. In something of a break with tradition for Patch Tuesday zero-day EoP vulnerabilities, exploitation only leads to administrator privileges rather than all the way to SYSTEM, but no attacker is going to waste too many cycles feeling sad about that.

Defender for Identity: situationally-ironic zero-day spoofing

Today sees the publication of CVE-2025-26685, a zero-day spoofing vulnerability in Microsoft Defender for Identity. The advisory provides puzzle pieces which don’t by themselves add up to anything like a full explanation of the vulnerability; no action is required for remediation, but you can render yourself vulnerable if you insist by opening a case with Microsoft Support to re-enable the legacy NTLM authentication method.

However, the FAQ does offer a link to an article published yesterday: Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity. This solid piece of documentation is part of the overall Defender for Identity administration guide, and explains that the lateral movement path detection feature can itself potentially be exploited by an adversary to obtain an NTLM hash.

Exploitation relies on achieving fallback from Kerberos to NTLM; the compromised credentials in this case would be those of the Directory Service Account for Defender for Identity. The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods; at time of writing, the Defender for Identity What’s new? page doesn’t yet describe the 3.x release, but this will presumably receive an update soon.

Microsoft lifecycle update

The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.

Summary charts

Patch Tuesday - May 2025
Patch Tuesday - May 2025
Patch Tuesday - May 2025

Summary tables

Apps vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29975 Microsoft PC Manager Elevation of Privilege Vulnerability No No 7.8

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29972 Azure Storage Resource Provider Spoofing Vulnerability No No 9.9
CVE-2025-29827 Azure Automation Elevation of Privilege Vulnerability No No 9.9
CVE-2025-30387 Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability No No 9.8
CVE-2025-47733 Microsoft Power Apps Information Disclosure Vulnerability No No 9.1
CVE-2025-33072 Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability No No 8.1
CVE-2025-29973 Microsoft Azure File Sync Elevation of Privilege Vulnerability No No 7

Azure Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-27488 Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability No No 6.7

Browser vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29825 Microsoft Edge (Chromium-based) Spoofing Vulnerability No No 6.5
CVE-2025-4372 Chromium: CVE-2025-4372 Use after free in WebAudio No No N/A
CVE-2025-4096 Chromium: CVE-2025-4096 Heap buffer overflow in HTML No No N/A
CVE-2025-4052 Chromium: CVE-2025-4052 Inappropriate implementation in DevTools No No N/A
CVE-2025-4051 Chromium: CVE-2025-4051 Insufficient data validation in DevTools No No N/A
CVE-2025-4050 Chromium: CVE-2025-4050 Out of bounds memory access in DevTools No No N/A

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29813 Azure DevOps Server Elevation of Privilege Vulnerability No No 10
CVE-2025-26646 .NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability No No 8
CVE-2025-32702 Visual Studio Remote Code Execution Vulnerability No Yes 7.8
CVE-2025-21264 Visual Studio Code Security Feature Bypass Vulnerability No No 7.1
CVE-2025-32703 Visual Studio Information Disclosure Vulnerability No No 5.5

ESU Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29962 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-29966 Remote Desktop Client Remote Code Execution Vulnerability No No 8.8
CVE-2025-29967 Remote Desktop Client Remote Code Execution Vulnerability No No 8.8
CVE-2025-32701 Windows Common Log File System Driver Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-32706 Windows Common Log File System Driver Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-30385 Windows Common Log File System Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-32707 NTFS Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24063 Kernel Streaming Service Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29831 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 7.5
CVE-2025-30397 Scripting Engine Memory Corruption Vulnerability Yes No 7.5
CVE-2025-29969 MS-EVEN RPC Remote Code Execution Vulnerability No No 7.5
CVE-2025-29833 Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability No No 7.1
CVE-2025-27468 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability No No 7
CVE-2025-29959 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29960 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29830 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29832 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29836 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29958 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29961 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29835 Windows Remote Access Connection Manager Information Disclosure Vulnerability No No 6.5
CVE-2025-29968 Active Directory Certificate Services (AD CS) Denial of Service Vulnerability No No 6.5
CVE-2025-29957 Windows Deployment Services Denial of Service Vulnerability No No 6.2
CVE-2025-30394 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability No No 5.9
CVE-2025-29954 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability No No 5.9
CVE-2025-29974 Windows Kernel Information Disclosure Vulnerability No No 5.7
CVE-2025-29837 Windows Installer Information Disclosure Vulnerability No No 5.5
CVE-2025-29956 Windows SMB Information Disclosure Vulnerability No No 5.4
CVE-2025-29839 Windows Multiple UNC Provider Driver Information Disclosure Vulnerability No No 4

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47732 Microsoft Dataverse Remote Code Execution Vulnerability No No 8.7
CVE-2025-29826 Microsoft Dataverse Elevation of Privilege Vulnerability No No 7.3

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-30377 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-30386 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-32704 Microsoft Excel Remote Code Execution Vulnerability No No 8.4
CVE-2025-30382 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7.8
CVE-2025-29976 Microsoft SharePoint Server Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29978 Microsoft PowerPoint Remote Code Execution Vulnerability No No 7.8
CVE-2025-32705 Microsoft Outlook Remote Code Execution Vulnerability No No 7.8
CVE-2025-29977 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-29979 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30375 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30376 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30379 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30381 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30383 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30393 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30384 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7.4
CVE-2025-30378 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7

Microsoft Office ESU Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-30388 Windows Graphics Component Remote Code Execution Vulnerability No No 7.8

System Center vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-26684 Microsoft Defender Elevation of Privilege Vulnerability No No 6.7
CVE-2025-26685 Microsoft Defender for Identity Spoofing Vulnerability No Yes 6.5

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29964 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-29840 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-29963 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-30400 Microsoft DWM Core Library Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-29970 Microsoft Brokering File System Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26677 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability No No 7.5
CVE-2025-29971 Web Threat Defense (WTD.sys) Denial of Service Vulnerability No No 7.5
CVE-2025-29842 UrlMon Security Feature Bypass Vulnerability No No 7.5
CVE-2025-29838 Windows ExecutionContext Driver Elevation of Privilege Vulnerability No No 7.4
CVE-2025-29841 Universal Print Management Service Elevation of Privilege Vulnerability No No 7
CVE-2025-29955 Windows Hyper-V Denial of Service Vulnerability No No 6.2
CVE-2025-29829 Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability No No 5.5

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now

Patch Tuesday - April 2025

Patch Tuesday - April 2025

Microsoft is addressing 121 vulnerabilities this April 2025 Patch Tuesday, which is more than twice as many as last month. Microsoft has evidence of in-the-wild exploitation for just one of the vulnerabilities published today, which is already reflected in CISA KEV. Once again, Microsoft has published zero-day vulnerabilities on Patch Tuesday without evaluating any of them as critical severity at time of publication, so that’s now a seven month unbroken streak. Today also sees the publication of 11 critical remote code execution (RCE) vulnerabilities. 13 browser vulnerabilities have already been published separately this month, and are not included in the total.

CLFS: zero-day EoP

The Windows Common Log File System (CLFS) Driver is firmly back on our radar today with CVE-2025-29824, a zero-day local elevation of privilege vulnerability. First, the good news: the Acknowledgements section credits the Microsoft Threat Intelligence Center, so the exploit was successfully reproduced by Microsoft; the less-good news is that someone other than Microsoft was first to discover the exploit, because otherwise Microsoft wouldn’t be listing CVE-2025-29824 as exploited in the wild. The advisory does not specify what privilege level is achieved upon successful exploitation, but it’ll be SYSTEM, because that’s the prize for all the other CLFS elevation of privilege zero-day vulnerabilities. As usual, some form of less-privileged local access is a pre-requisite, but attack complexity is low, so this is the sort of vulnerability which goes into any standard break-and-enter toolkit. Given the long history of similar vulnerabilities, it would be more surprising if exploit code wasn’t publicly available in the not-too-distant future. Although December 2024 Patch Tuesday seems as though it must have been a very long time ago, any standard calendar will tell us that only 119 days have elapsed since the last zero-day CLFS local elevation of privilege. Rapid7 discussed the history of CLFS zero-day elevation of privilege vulnerabilities at the time. All versions of Windows receive a patch, except for the venerable LTSC Windows 10 1507, which is listed on the advisory as vulnerable, but left out in the cold with no update; the FAQ says to check back later. Windows 10 LTSC 1507 is scheduled for end of servicing on 2025-10-14, so the clock is ticking regardless.

LDAP Server: critical RCE

Although it has been many months since we’ve seen a critical zero-day vulnerability from Microsoft, there is no shortage of critical remote code execution (RCE) vulnerabilities published today. Defenders responsible for an LDAP server — which means almost any organization with a non-trivial Microsoft footprint — should add patching for CVE-2025-26663 to their to-do list. With no privileges required, no need for user interaction, and code execution presumably in the context of the LDAP server itself, successful exploitation would be an attractive shortcut to any attacker. Anyone wondering if today is a re-run of December 2024 Patch Tuesday can take some small solace in the fact that the worst of the trio of LDAP critical RCEs published at the end of last year was likely easier to exploit than today’s example, since today’s CVE-2025-26663 requires that an attacker win a race condition. Despite that, Microsoft still expects that exploitation is more likely.

LDAP Client: critical RCE

If you breathe a sigh of relief when you see LDAP server critical RCE vulnerabilities like CVE-2025-26663, because you’re certain that you don’t have any Windows LDAP servers in your estate, how about LDAP clients? CVE-2025-26670 describes a critical RCE in the LDAP client, although the FAQ confusingly states that exploitation would require an attacker to “send specially crafted requests to a vulnerable LDAP server”; this seems like it might be a data entry error on the advisory FAQ, so keep an eye out for an update to that section of the advisory. Assuming the rest of the advisory is all present and correct, exploitation requires that the attacker win a race condition, which keeps the attack complexity higher than it otherwise would be. While we wait for clarification, it’s still a critical RCE which Microsoft rates as “exploitation more likely”. On that basis, patching is always recommended.

RDS: critical RCEs

The prolific Windows vulnerability pioneers at Kunlun Lab are credited with a pair of critical RCE vulnerabilities in Windows Remote Desktop Services. Although both CVE-2025-27480 and CVE-2025-27482 share a CVSSv3 base score of 8.1, Microsoft has ranked them both as critical using its own proprietary severity ranking scale. Both vulnerabilities require that an attacker win a race condition. If you’ve ever read Microsoft’s guide to deploying the Remote Desktop Gateway role, you probably have some systems to patch.

Hyper-V: critical RCE

Some Microsoft security advisory FAQs provide a satisfying level of detail, whereas others raise more questions than they answer. CVE-2025-27491 is a Hyper-V critical RCE which falls into the second category, since it states that an attacker must be authenticated — no need for elevated privileges — but also that the attacker must send the user a malicious site and convince them to open it, and it’s not at all clear why authentication would be required in that case. Also unusual: the remediation table on the advisory lists several 32-bit versions of Windows as receiving patches, although Hyper-V requires a 64-bit processor and a 64-bit host OS.

Microsoft lifecycle update

In Microsoft product lifecycle news, Dynamics GP 2015 moves past the end of extended support today. The next batch of significant lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close.

Summary charts

Patch Tuesday - April 2025
Patch Tuesday - April 2025
Elevated amounts of elevation of privilege
Patch Tuesday - April 2025

Summary tables

Apps vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29805 Outlook for Android Information Disclosure Vulnerability No No 7.5

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-27489 Azure Local Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26628 Azure Local Cluster Information Disclosure Vulnerability No No 7.3
CVE-2025-25002 Azure Local Cluster Information Disclosure Vulnerability No No 6.8

Browser vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-25000 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability No No 8.8
CVE-2025-29815 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability No No 7.6
CVE-2025-29796 Microsoft Edge for iOS Spoofing Vulnerability No No 4.7
CVE-2025-25001 Microsoft Edge for iOS Spoofing Vulnerability No No 4.3
CVE-2025-3074 Chromium: CVE-2025-3074 Inappropriate implementation in Downloads No No N/A
CVE-2025-3073 Chromium: CVE-2025-3073 Inappropriate implementation in Autofill No No N/A
CVE-2025-3072 Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs No No N/A
CVE-2025-3071 Chromium: CVE-2025-3071 Inappropriate implementation in Navigations No No N/A
CVE-2025-3070 Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions No No N/A
CVE-2025-3069 Chromium: CVE-2025-3069 Inappropriate implementation in Extensions No No N/A
CVE-2025-3068 Chromium: CVE-2025-3068 Inappropriate implementation in Intents No No N/A
CVE-2025-3067 Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs No No N/A
CVE-2025-3066 Chromium: CVE-2025-3066 Use after free in Navigations No No N/A

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-26682 ASP.NET Core and Visual Studio Denial of Service Vulnerability No No 7.5
CVE-2025-29802 Visual Studio Elevation of Privilege Vulnerability No No 7.3
CVE-2025-29804 Visual Studio Elevation of Privilege Vulnerability No No 7.3
CVE-2025-20570 Visual Studio Code Elevation of Privilege Vulnerability No No 6.8

Developer Tools SQL Server vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29803 Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability No No 7.3

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29821 Microsoft Dynamics Business Central Information Disclosure Vulnerability No No 5.5

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29794 Microsoft SharePoint Remote Code Execution Vulnerability No No 8.8
CVE-2025-27747 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-29820 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-29822 Microsoft OneNote Security Feature Bypass Vulnerability No No 7.8
CVE-2025-27745 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-27748 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-27749 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-27746 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-26642 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-27744 Microsoft Office Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27752 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-29791 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-27751 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-27750 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-29823 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-29800 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29801 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29816 Microsoft Word Security Feature Bypass Vulnerability No No 7.5
CVE-2025-29792 Microsoft Office Elevation of Privilege Vulnerability No No 7.3
CVE-2025-29793 Microsoft SharePoint Remote Code Execution Vulnerability No No 7.2

System Center vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-27743 Microsoft System Center Elevation of Privilege Vulnerability No No 7.8

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-26678 Windows Defender Application Control Security Feature Bypass Vulnerability No No 8.4
CVE-2025-27482 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-26639 Windows USB Print Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26675 Windows Subsystem for Linux Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27729 Windows Shell Remote Code Execution Vulnerability No No 7.8
CVE-2025-29811 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26666 Windows Media Remote Code Execution Vulnerability No No 7.8
CVE-2025-26674 Windows Media Remote Code Execution Vulnerability No No 7.8
CVE-2025-27728 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27739 Windows Kernel Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27476 Windows Digital Media Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27467 Windows Digital Media Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27730 Windows Digital Media Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24058 Windows DWM Core Library Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27490 Windows Bluetooth Service Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27731 Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24074 Microsoft DWM Core Library Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24073 Microsoft DWM Core Library Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24060 Microsoft DWM Core Library Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24062 Microsoft DWM Core Library Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29812 DirectX Graphics Kernel Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29809 Windows Kerberos Security Feature Bypass Vulnerability No No 7.1
CVE-2025-27491 Windows Hyper-V Remote Code Execution Vulnerability No No 7.1
CVE-2025-27475 Windows Update Stack Elevation of Privilege Vulnerability No No 7
CVE-2025-26649 Windows Secure Channel Elevation of Privilege Vulnerability No No 7
CVE-2025-27492 Windows Secure Channel Elevation of Privilege Vulnerability No No 7
CVE-2025-26640 Windows Digital Media Elevation of Privilege Vulnerability No No 7
CVE-2025-26681 Win32k Elevation of Privilege Vulnerability No No 6.7
CVE-2025-26651 Windows Local Session Manager (LSM) Denial of Service Vulnerability No No 6.5
CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability No No 6.5
CVE-2025-27735 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability No No 6
CVE-2025-27736 Windows Power Dependency Coordinator Information Disclosure Vulnerability No No 5.5
CVE-2025-29808 Windows Cryptographic Services Information Disclosure Vulnerability No No 5.5
CVE-2025-26644 Windows Hello Spoofing Vulnerability No No 5.1

Windows Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29819 Windows Admin Center in Azure Portal Information Disclosure Vulnerability No No 6.2

Windows ESU vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-27477 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21205 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21221 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-21222 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-27481 Windows Telephony Service Remote Code Execution Vulnerability No No 8.8
CVE-2025-26669 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 8.8
CVE-2025-27740 Active Directory Certificate Services Elevation of Privilege Vulnerability No No 8.8
CVE-2025-27737 Windows Security Zone Mapping Security Feature Bypass Vulnerability No No 8.6
CVE-2025-27480 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-26671 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-26663 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability No No 8.1
CVE-2025-26647 Windows Kerberos Elevation of Privilege Vulnerability No No 8.1
CVE-2025-26670 Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability No No 8.1
CVE-2025-27487 Remote Desktop Client Remote Code Execution Vulnerability No No 8
CVE-2025-21204 Windows Process Activation Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26648 Windows Kernel Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27727 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29824 Windows Common Log File System Driver Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-26679 RPC Endpoint Mapper Service Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27741 NTFS Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27483 NTFS Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27733 NTFS Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26688 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability No No 7.8
CVE-2025-27484 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability No No 7.5
CVE-2025-26686 Windows TCP/IP Remote Code Execution Vulnerability No No 7.5
CVE-2025-26680 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-27470 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-21174 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-26652 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-27485 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-27486 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-26668 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 7.5
CVE-2025-26673 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability No No 7.5
CVE-2025-27469 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability No No 7.5
CVE-2025-26641 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability No No 7.5
CVE-2025-27479 Kerberos Key Distribution Proxy Service Denial of Service Vulnerability No No 7.5
CVE-2025-27473 HTTP.sys Denial of Service Vulnerability No No 7.5
CVE-2025-29810 Active Directory Domain Services Elevation of Privilege Vulnerability No No 7.5
CVE-2025-26665 Windows upnphost.dll Elevation of Privilege Vulnerability No No 7
CVE-2025-27478 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability No No 7
CVE-2025-21191 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability No No 7
CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability No No 7
CVE-2025-26637 BitLocker Security Feature Bypass Vulnerability No No 6.8
CVE-2025-26664 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-26667 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-27474 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-21203 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-26672 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-26676 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-27738 Windows Resilient File System (ReFS) Information Disclosure Vulnerability No No 6.5
CVE-2025-21197 Windows NTFS Information Disclosure Vulnerability No No 6.5
CVE-2025-27471 Microsoft Streaming Service Denial of Service Vulnerability No No 5.9
CVE-2025-27742 NTFS Information Disclosure Vulnerability No No 5.5
CVE-2025-27472 Windows Mark of the Web Security Feature Bypass Vulnerability No No 5.4

Windows ESU Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-26687 Win32k Elevation of Privilege Vulnerability No No 7.5

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now
❌