Article Details
Scrape Timestamp (UTC): 2025-06-10 17:40:22.631
Original Article Text
Click to Toggle View
Microsoft June 2025 Patch Tuesday fixes exploited zero-day, 66 flaws. Today is Microsoft's June 2025 Patch Tuesday, which includes security updates for 66 flaws, including one actively exploited vulnerability and another that was publicly disclosed. This Patch Tuesday also fixes ten "Critical" vulnerabilities, eight being remote code execution vulnerabilities and two being elevation of privileges bugs. The number of bugs in each vulnerability category is listed below: This count does not include Mariner, Microsoft Edge, and Power Automate flaws fixed earlier this month. Two zero-days This month's Patch Tuesday fixes one actively exploited zero-day and one publicly disclosed vulnerability. Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available. The actively exploited zero-day vulnerability in today's updates is: CVE-2025-33053 - Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability Microsoft fixed a remote code execution vulnerability discovered by Check Point Research "A remote code execution vulnerability exists in Microsoft Windows Web Distributed Authoring and Versioning. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system," reads a Check Point Research advisory. Microsoft's advisory further states that a user must click on a specially crafted WebDav URL for the flaw to be exploited. While Microsoft says that the vulnerability has been exploited in attacks, no further details have been shared. BleepingComputer contacted Check Point to learn more about how the flaw was used in attacks. Microsoft attributes the discovery of this flaw to Alexandra Gofman and David Driker (Check Point Research). The publicly disclosed zero-day is: CVE-2025-33073 - Windows SMB Client Elevation of Privilege Vulnerability Microsoft fixes a flaw in Windows SMB that allows attackers to gain SYSTEM privileges on vulnerable devices. "Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network," explains Microsoft. "To exploit this vulnerability, an attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate. This could result in elevation of privilege," further explains Microsoft. Microsoft has not shared how the flaw was publicly disclosed. However, Born City reports that DFN-CERT (Computer Emergency Response Team of the German Research Network) began circulating warnings from RedTeam Pentesting about the flaw this week. While an update is now available, the flaw can reportedly be mitigated by enforcing server-side SMB signing via Group Policy. Microsoft attributes the discovery of this flaw to multiple researchers, including Keisuke Hirata with CrowdStrike, Synacktiv research with Synacktiv, Stefan Walter with SySS GmbH, RedTeam Pentesting GmbH, and James Forshaw of Google Project Zero. Recent updates from other companies Other vendors who released updates or advisories in June 2025 include: The June 2025 Patch Tuesday Security Updates Below is the complete list of resolved vulnerabilities in the June 2025 Patch Tuesday updates. To access the full description of each vulnerability and the systems it affects, you can view the full report here. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.
Daily Brief Summary
Microsoft's June 2025 Patch Tuesday addressed 66 vulnerabilities, including ten deemed critical.
The patch corrected one actively exploited zero-day and another vulnerability that was publicly disclosed.
The actively exploited zero-day involved a remote code execution flaw in Web Distributed Authoring and Versioning (WEBDAV).
The exploitation of this vulnerability allowed attackers to execute arbitrary code by having a user click a specially crafted URL.
A publicly disclosed elevation of privilege vulnerability in Windows SMB Client was also fixed, which previously allowed attackers to gain SYSTEM privileges.
Mitigation strategies for the SMB Client flaw included enforcing server-side SMB signing.
Other tech companies have also released updates and advisories in the same period, indicating a broader focus on cybersecurity threats.
Microsoft attributes the identification of these flaws to multiple security researchers and organizations.