Microsoft Fixes 67 Security Flaws in June 2025 Update Includes Two Zero‑Day Vulnerabilities

Microsoft Fixes 67 Security Flaws in June 2025 Update Includes Two Zero‑Day Vulnerabilities
Photo Credit : Pixabay

Every second Tuesday of the month—called Patch Tuesday—Microsoft rolls out a batch of security updates. On June 10, 2025, they unveiled patches for 67 vulnerabilities, among which were two zero-day security flaws that either were already exploited or publicly disclosed. For organizations and individuals alike, understanding these risks and taking action is critical to staying secure.


What’s in the Patch: A Quick Overview

Total vulnerabilities fixed: 67, spanning everything from Windows core services to Microsoft Office.

Severity levels:

11 Critical – remote code execution (RCE) risks.

56 Important – including information disclosure and privilege escalation. 

Types: 26 RCE, 17 info disclosure, 14 privilege escalation, plus denial-of-service, spoofing, and security bypass bugs.


Zero‑Day  1: CVE‑2025‑33053 – WebDAV RCE (Actively Exploited)

What is WebDAV?

A protocol that enables file manipulation over HTTP.

Considered legacy, often disabled by default but still supported across Windows variants.

The Threat

Requires minimal victim action: clicking a malicious URL.

Exploitation manipulates the working directory to run malicious code.

Who’s Behind It?

Attributed to Stealth Falcon (a.k.a. FruityArmor), a sophisticated espionage-focused APT.

They reportedly exploited the flaw during an attack on a defense contractor earlier in 2025.

Score & Severity

CVSS 8.8 – categorized as “Important,” although many experts treat this as effectively Critical.


Zero‑Day 2: CVE‑2025‑33073 – SMB Client Privilege Escalation

Nature of the Flaw

A privilege escalation issue in the SMB client (used for network file sharing).

An attacker-controlled SMB server can elevate a connected system to SYSTEM privileges.

Public Disclosure

Proof-of-concept (PoC) exploits are already circulating publicly.

Multiple researchers and groups—including Google Project Zero—caught and reported it.

Severity

CVSS 8.8 – currently rated “Important,” but flagged by many as warranting immediate attention.


Other Critical Fixes You Shouldn’t Ignore

8 RCE bugs in Microsoft Office/SharePoint and Windows components like Remote Desktop, Schannel, Netlogon, and KDC proxy.

Examples include:

CVE‑2025‑47162, 47164, 47167 – Office RCE through Preview Pane (Patch ASAP). 

CVE‑2025‑33070 – Netlogon EoP.

CVE‑2025‑33071 – KDC Proxy RCE.

CVE‑2025‑32710 – Remote Desktop Services RCE.

CVE‑2025‑29828 – Schannel RCE.


Business Insight: Trends and Advice

Rapid7 and industry peers emphasize that even though threats are labeled “Important,” they often behave like “Critical.

A sense of urgency is warranted:

WebDAV and SMB flaws are accessible via simple user actions (click or connect).

PoCs and in-the-wild attacks mean delays can be risky.


Action Plan: What You Should Do Now

Patch your systems immediately prioritize Windows Server, Windows 11, and affected Office/Exchange installations.

Audit SMB server connections enforce SMB signing and consider isolation policies.

Review use of legacy services like WebDAV uninstall or disable components if not needed.

Deploy email and link safety measures warnings, filters, and security training can block attack vectors.

Monitor cyber threat feeds organizations like CISA maintain known exploited vulnerability lists.


Real‑World Impact: A Small Case Study

Stealth Falcon’s WebDAV exploit reportedly targeted a defense contractor earlier this year. By embedding a malicious URL in a spear‑phishing email, they tricked an operator into loading a WebDAV link, triggering malware execution. The follow-on payload, dubbed the Horus Agent, enabled credential dumps and keylogging all by abusing Windows built-in behavior. 


The Big Picture: Don’t Get Complacent

Patch Tuesday remains vital: monthly updates help secure the countless Windows and Office installations worldwide.

The evolving pattern legacy protocols exploited, zero-days emerging tests both strategies and assumptions.

The cybersecurity gap narrows between legacy vulnerabilities and modern defenses.

Even non-Critical tags can conceal severe real-world damage; proactive patching is a must.


June’s update is a clarion call: 67 vulnerabilities patched, including two zero-days, one actively malicious, the other privately exposed. These aren’t just numbers they’re active threats. Whether you’re an IT pro managing global systems or a user on a home PC, applying these patches is essential.

Resilience in cybersecurity isn’t optional. By staying current, limiting unnecessary services, and empowering users to recognize threats, you’re taking critical steps toward stronger defense. When it comes to cyber threats, the best offense is a proactive patch strategy.

Post a Comment

0 Comments