Sunday, June 15, 2025
HomeCyber Security NewsMicrosoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws...

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across its software portfolio, including Windows, Microsoft Office, Azure, and Visual Studio.

Microsoft patched a total of 72 vulnerabilities, including 29 related to Remote Code Execution, 18 to Elevation of Privilege, 14 to Information Disclosure, 7 to Denial of Service, and 2 each to Spoofing and Security Feature Bypass.

5 of these flaws are zero-day vulnerabilities confirmed to be under active exploitation, is urging immediate action to apply patches and mitigate risks.

- Advertisement - Google News

Zero-Days Under Attack

The five actively exploited zero-day vulnerabilities pose an immediate threat, as attackers have exploited them in the wild. These include:

  • CVE-2025-30397 (Microsoft Scripting Engine): Rated 7.5 on the CVSS scale, this flaw allows attackers to execute malicious code through specially crafted web content. Exploitation has been detected, and patching is critical.
  • CVE-2025-30400 (Windows Desktop Window Manager): Scoring 7.8, this vulnerability enables privilege escalation, with confirmed reports of active exploitation.
  • CVE-2025-32701& CVE-2025-32706 (Windows Common Log File System Driver): Both rated 7.8, these flaws allow attackers to escalate privileges and are actively being exploited.
  • CVE-2025-32709 (Windows Ancillary Function Driver for WinSock): Also rated 7.8, this vulnerability facilitates privilege escalation and is under active attack.

Windows and Office Hit Hard

Windows components, including the Kernel and Remote Desktop Gateway Service, were heavily targeted. Key vulnerabilities include:

  • CVE-2025-24063 (Windows Kernel): Rated 7.8 and flagged as “Exploitation More Likely,” this flaw could allow attackers to gain elevated privileges.
  • CVE-2025-29971 (Web Threat Defense): Rated 7.5, this vulnerability is also deemed “Exploitation More Likely” and could lead to denial-of-service attacks.

Microsoft Office products, particularly Excel and SharePoint, saw multiple patches:

  • CVE-2025-30382 (Microsoft Office SharePoint): Rated 7.8, this flaw could enable local privilege escalation, with exploitation considered more likely.
  • CVE-2025-30393 (Microsoft Office Excel): One of several Excel vulnerabilities, rated 7.8, that could allow remote code execution via malicious files.

Microsoft Patch Tuesday May 2025- Vulnerabilities list

CVE NumberCVE TitleImpactMax Severity
CVE-2025-29966Remote Desktop Client Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-29967Remote Desktop Client Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-30377Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-30386Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-29833Microsoft Virtual Machine Bus (VMBus) Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-26629Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-26646.NET, Visual Studio, and Build Tools for Visual Studio Spoofing VulnerabilitySpoofingImportant
CVE-2025-26684Microsoft Defender Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29959Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29960Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29964Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29968Active Directory Certificate Services (AD CS) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29969MS-EVEN RPC Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29970Microsoft Brokering File System Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29973Microsoft Azure File Sync Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29971Web Threat Defense (WTD.sys) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29975Microsoft PC Manager Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29976Microsoft SharePoint Server Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29977Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29978Microsoft PowerPoint Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29979Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30375Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30376Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30378Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30379Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30381Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30382Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30383Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30384Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30387Document Intelligence Studio On-Prem Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-27468Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-30393Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29826Microsoft Dataverse Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-30394Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-30400Microsoft DWM Core Library Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-32701Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-32703Visual Studio Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-32706Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-21264Visual Studio Code Security Feature Bypass VulnerabilitySecurity Feature BypassImportant
CVE-2025-32709Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-26677Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-27488Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-26685Microsoft Defender for Identity Spoofing VulnerabilitySpoofingImportant
CVE-2025-29829Windows Trusted Runtime Interface Driver Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29830Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29831Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29832Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29835Windows Remote Access Connection Manager Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29836Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29837Windows Installer Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29838Windows ExecutionContext Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29839Windows Multiple UNC Provider Driver Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29840Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29841Universal Print Management Service Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29842UrlMon Security Feature Bypass VulnerabilitySecurity Feature BypassImportant
CVE-2025-29954Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29955Windows Hyper-V Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29956Windows SMB Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29957Windows Deployment Services Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29958Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29961Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29962Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29963Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29974Windows Kernel Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-30385Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-30388Windows Graphics Component Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30397Scripting Engine Memory Corruption VulnerabilityRemote Code ExecutionImportant
CVE-2025-32702Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-32704Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-32705Microsoft Outlook Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-32707NTFS Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-24063Kernel Streaming Service Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant

Microsoft urges users and IT administrators to apply these updates without delay using Windows Update or enterprise management tools. With an actively exploited zero-day vulnerability in play, postponing the update could expose systems to immediate and ongoing threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...