
Microsoft’s June Patch Tuesday replace has landed, bringing safety fixes for 66 vulnerabilities throughout its product line. Among the many patched flaws is one which was already being exploited in real-world assaults, making this month’s updates significantly vital for each enterprises and particular person customers.
One Zero-Day Actively Exploited
The standout repair addresses CVE-2025-33053, a vulnerability within the WebDAV part of Home windows. This flaw might permit attackers to execute code remotely if exploited accurately. Because it was already being utilized in assaults earlier than at present’s patch launch, it falls into the “zero-day” class.
The WebDAV vulnerability impacts each Home windows 10 and Home windows 11, together with associated server variations. Whereas Microsoft has not disclosed the total particulars of the assaults, they’ve confirmed that the bug was present in use within the wild.
10 Crucial Points Fastened
Along with the zero-day, Microsoft patched 10 vulnerabilities rated Crucial, which typically means they permit distant code execution or elevation of privilege with out a lot person interplay. These embrace 4 bugs in Microsoft Workplace, which proceed to be an everyday goal for attackers trying to ship malicious paperwork by way of e-mail.
Different merchandise receiving fixes embrace Microsoft Edge, Energy Automate, .NET, and parts of Home windows itself. Whereas not one of the different points had been reported as actively exploited, a number of are marked as extra prone to be focused within the close to time period.
Home windows Replace Particulars
The up to date packages can be found now and embrace:
- Home windows 11: KB5060842 (22H2 and 23H2)
- Home windows 10: KB5060533 and KB5060999
- Home windows Server variations: Additionally up to date, relying on the construct in use.
Admins ought to test their replace administration techniques to verify rollout and assess any compatibility issues which will come up from the newest patches.
Why This Month Issues
The fast exploitation of CVE-2025-33053 as soon as once more reveals how briskly attackers transfer when new vulnerabilities are disclosed. Whereas zero days typically make headlines, the opposite fixes shouldn’t be ignored. A number of of this month’s bugs contain parts typically uncovered to the web or steadily utilized in enterprise environments.
Corporations that delay patching aren’t simply risking knowledge theft but in addition the price of restoration from ransomware, which regularly begins with bugs like those patched at present.
Nick Carroll, cyber incident response supervisor at Nightwing, the intelligence options firm divested from RTX, commented on the Patch Tuesday occasion, stating, “There are a few vulnerabilities for the Home windows Frequent Log File System (CVE-2025-32701 and CVE-2025-32706) that are Priv Esc vulnerabilities. These aren’t important, which implies some organizations received’t prioritize patching them as shortly as they in all probability ought to. And in the event you have a look at what tends to get loads of consideration, important vulnerabilities catch all the thrill,” famous Nick.
“However we see actual world assaults abusing that Home windows Log File subsystem fairly repeatedly. In reality, Nightwing has defended in opposition to exploits within the Home windows Frequent Log File System in actual world assaults final month associated to the just lately patched CVE-2025-29824 the place the risk actors had been abusing Residing-off-the-Land ways along with the exploit,” he added.
What to Do Now
- Apply all out there June updates as quickly as potential, particularly for techniques utilizing WebDAV
- Evaluation your Workplace file dealing with insurance policies, particularly if customers steadily obtain paperwork from outdoors the group
- Monitor community site visitors for indicators of suspicious exercise linked to WebDAV or different patched companies
- Take a look at in staging environments earlier than rolling out company-wide, particularly in environments with older or personalized software program stacks
Microsoft’s full advisory could be discovered on its official safety replace information. Patching shortly stays one of many easiest and only defences in opposition to many types of cyberattacks.