Microsoft Monthly Security Update (June 2025)
RISK: Extremely High Risk
TYPE: Operating Systems - Windows OS
Microsoft has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes |
Microsoft Office | ![]() | Remote Code Execution Elevation of Privilege | |
Windows | ![]() | Remote Code Execution Elevation of Privilege Information Disclosure Denial of Service Security Restriction Bypass Spoofing | CVE-2025-33053 is being exploited in the wild. This vulnerability exist in Microsoft Windows Web Distributed Authoring and Versioning. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. Hence, the risk level of this vulnerability is rated as Extremely High Risk.
Proof of Concept exploit code is publicly available for CVE-2025-33073, affecting the Windows Server Message Block client. Successful exploitation of this vulnerability could allow an authorized attacker to elevate privileges on the affected system. Hence, the risk level of this vulnerability is rated as Medium Risk. |
Developer Tools | ![]() | Remote Code Execution Elevation of Privilege | |
Extended Security Updates (ESU) | ![]() | Remote Code Execution Elevation of Privilege Information Disclosure Denial of Service Security Restriction Bypass | CVE-2025-33053 is being exploited in the wild. This vulnerability exist in Microsoft Windows Web Distributed Authoring and Versioning. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. Hence, the risk level of this vulnerability is rated as Extremely High Risk.
Proof of Concept exploit code is publicly available for CVE-2025-33073, affecting the Windows Server Message Block client. Successful exploitation of this vulnerability could allow an authorized attacker to elevate privileges on the affected system. Hence, the risk level of this vulnerability is rated as Medium Risk. |
Microsoft Dynamics | ![]() | Elevation of Privilege | |
Azure | ![]() | Spoofing |
Number of 'Extremely High Risk' product(s): 2
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 3
Number of 'Low Risk' product(s): 1
Evaluation of overall 'Risk Level': Extremely High Risk
Impact
- Remote Code Execution
- Elevation of Privilege
- Information Disclosure
- Denial of Service
- Security Restriction Bypass
- Spoofing
System / Technologies affected
- Microsoft Office
- Windows
- Developer Tools
- Extended Security Updates (ESU)
- Microsoft Dynamics
- Azure
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor.
沒有留言:
發佈留言