Microsoft’s June Patch Tuesday replace has landed, bringing safety fixes for 66 vulnerabilities throughout its product line. Among the many patched flaws is one which was already being exploited in real-world assaults, making this month’s updates significantly vital for each enterprises and particular person customers.
One Zero-Day Actively Exploited
The standout repair addresses CVE-2025-33053, a vulnerability within the WebDAV part of Home windows. This flaw may enable attackers to execute code remotely if exploited accurately. Because it was already being utilized in assaults earlier than right now’s patch launch, it falls into the “zero-day” class.
The WebDAV vulnerability impacts each Home windows 10 and Home windows 11, together with associated server variations. Whereas Microsoft has not disclosed the total particulars of the assaults, they’ve confirmed that the bug was present in use within the wild.
10 Important Points Mounted
Along with the zero-day, Microsoft patched 10 vulnerabilities rated Important, which typically means they permit distant code execution or elevation of privilege with out a lot consumer interplay. These embrace 4 bugs in Microsoft Workplace, which proceed to be an everyday goal for attackers seeking to ship malicious paperwork via e-mail.
Different merchandise receiving fixes embrace Microsoft Edge, Energy Automate, .NET, and parts of Home windows itself. Whereas not one of the different points had been reported as actively exploited, a number of are marked as extra more likely to be focused within the close to time period.
Home windows Replace Particulars
The up to date packages can be found now and embrace:
- Home windows 11: KB5060842 (22H2 and 23H2)
- Home windows 10: KB5060533 and KB5060999
- Home windows Server variations: Additionally up to date, relying on the construct in use.
Admins ought to test their replace administration techniques to verify rollout and assess any compatibility issues which will come up from the newest patches.
Why This Month Issues
The short exploitation of CVE-2025-33053 as soon as once more exhibits how briskly attackers transfer when new vulnerabilities are disclosed. Whereas zero days typically make headlines, the opposite fixes shouldn’t be ignored. A number of of this month’s bugs contain parts typically uncovered to the web or ceaselessly utilized in enterprise environments.
Firms that delay patching should not simply risking information theft but in addition the price of restoration from ransomware, which frequently begins with bugs like those patched right now.
Nick Carroll, cyber incident response supervisor at Nightwing, the intelligence options firm divested from RTX, commented on the Patch Tuesday occasion, stating, “There are a few vulnerabilities for the Home windows Frequent Log File System (CVE-2025-32701 and CVE-2025-32706) that are Priv Esc vulnerabilities. These aren’t vital, which implies some organizations gained’t prioritize patching them as shortly as they most likely ought to. And in the event you take a look at what tends to get quite a lot of consideration, vital vulnerabilities catch all the excitement,” famous Nick.
“However we see actual world assaults abusing that Home windows Log File subsystem fairly recurrently. In truth, Nightwing has defended towards exploits within the Home windows Frequent Log File System in actual world assaults final month associated to the lately patched CVE-2025-29824 the place the menace actors had been abusing Dwelling-off-the-Land ways at the side of the exploit,” he added.
What to Do Now
- Apply all accessible June updates as quickly as attainable, particularly for techniques utilizing WebDAV
- Overview your Workplace file dealing with insurance policies, particularly if customers ceaselessly obtain paperwork from outdoors the group
- Monitor community visitors for indicators of suspicious exercise linked to WebDAV or different patched providers
- Check in staging environments earlier than rolling out company-wide, particularly in environments with older or personalized software program stacks
Microsoft’s full advisory may be discovered on its official safety replace information. Patching shortly stays one of many easiest and handiest defences towards many types of cyberattacks.