Analysis of Microsoft Patch Tuesday updates - June 2025
Executive Summary
On Tuesday, June 10, 2025, Microsoft released its monthly security patch addressing 66 vulnerabilities across its products.
By severity:
- Important — 56;
- Critical — 10.
Exploited (Zero-Days) and Publicly Disclosed Vulnerabilities
Special attention should be paid to the following 2 vulnerabilities. Fixing them is the highest priority:
- CVE-2025-33053 (CVSS 8.8; Important) — Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability (Remote Code Execution). A vulnerability in Microsoft Windows Web Distributed Authoring and Versioning (WEBDAV) allows a remote attacker to execute arbitrary code if a user visits a specially crafted WebDAV URL.
- CVE-2025-33073 (CVSS 8.8; Important) — Windows SMB Client Elevation of Privilege Vulnerability (Elevation of Privilege). Improper access control in the Windows SMB client allows an authenticated attacker to elevate their privileges on the network to SYSTEM by executing a malicious script.
General Overview and Trends
Microsoft’s June 2025 Patch Tuesday includes fixes for 66 vulnerabilities, fewer than in the extensive May release. Despite the lower overall number, the package includes 10 critical vulnerabilities that require urgent attention. Key trends observed this month:
- Large number of remote code execution (RCE) vulnerabilities: A significant share of the fixes, including several critical ones, is aimed at addressing RCE flaws. The main focus was on Microsoft Office (Word, Excel, Outlook, PowerPoint) and Microsoft SharePoint Server, underscoring their role as key attack vectors in enterprise environments.
- Multiple information disclosure vulnerabilities: A distinguishing feature this month is the large number of similar Information Disclosure issues in the Windows Storage Management Provider component. While they are rated as medium severity, their volume may indicate a systemic problem in this component.
- Denial-of-service (DoS) vulnerabilities: Several important fixes were released for DoS issues in network services such as DHCP Server and Local Security Authority (LSA). Exploiting these vulnerabilities could disrupt the stability and availability of key network services.
- Ongoing elevation-of-privilege (EoP) risk: As in previous months, elevation-of-privilege vulnerabilities remain a pressing issue. In June, EoP flaws were fixed in components such as Windows Task Scheduler and Windows Installer, indicating Microsoft’s continued work to harden the system core.
Full List of Vulnerabilities
Below is a table of all vulnerabilities fixed this month.
| CVE | Title | Type | CVSS | Severity | Exploited | Publicly Disclosed |
|---|---|---|---|---|---|---|
| CVE-2025-33053 | Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | Yes | No |
| CVE-2025-33073 | Windows SMB Client Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | Yes |
| CVE-2025-47966 | Power Automate Elevation of Privilege Vulnerability | Elevation of Privilege | 9.8 | Critical | No | No |
| CVE-2025-33064 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2025-33066 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2025-47163 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2025-47166 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2025-47172 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Critical | No | No |
| CVE-2025-33067 | Windows Task Scheduler Elevation of Privilege Vulnerability | Elevation of Privilege | 8.4 | Important | No | No |
| CVE-2025-47162 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2025-47164 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2025-47167 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2025-47953 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2025-47957 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Important | No | No |
| CVE-2025-29828 | Windows Schannel Remote Code Execution Vulnerability | Remote Code Execution | 8.1 | Critical | No | No |
| CVE-2025-32710 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Remote Code Execution | 8.1 | Critical | No | No |
| CVE-2025-33070 | Windows Netlogon Elevation of Privilege Vulnerability | Elevation of Privilege | 8.1 | Critical | No | No |
| CVE-2025-33071 | Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability | Remote Code Execution | 8.1 | Critical | No | No |
| CVE-2025-32712 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-32713 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-32714 | Windows Installer Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-32716 | Windows Media Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-32718 | Windows SMB Client Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-33075 | Windows Installer Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-47165 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47168 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47169 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47170 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47173 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47174 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47175 | Microsoft PowerPoint Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47176 | Microsoft Outlook Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2025-47955 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-47962 | Windows SDK Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-47968 | Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2025-47977 | Nuance Digital Engagement Platform Spoofing Vulnerability | Spoofing | 7.6 | Important | No | No |
| CVE-2025-30399 | .NET and Visual Studio Remote Code Execution Vulnerability | Remote Code Execution | 7.5 | Important | No | No |
| CVE-2025-32724 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2025-32725 | DHCP Server Service Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2025-33050 | DHCP Server Service Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2025-33056 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2025-33068 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2025-32721 | Windows Recovery Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.3 | Important | No | No |
| CVE-2025-47959 | Visual Studio Remote Code Execution Vulnerability | Remote Code Execution | 7.1 | Important | No | No |
| CVE-2025-47171 | Microsoft Outlook Remote Code Execution Vulnerability | Remote Code Execution | 6.7 | Important | No | No |
| CVE-2025-32715 | Remote Desktop Protocol Client Information Disclosure Vulnerability | Information Disclosure | 6.5 | Important | No | No |
| CVE-2025-33057 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | Denial of Service | 6.5 | Important | No | No |
| CVE-2025-24065 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-24068 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-24069 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-32719 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-32720 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-32722 | Windows Storage Port Driver Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33052 | Windows DWM Core Library Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33055 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33058 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33059 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33060 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33061 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33062 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33063 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-33065 | Windows Storage Management Provider Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2025-47956 | Windows Security App Spoofing Vulnerability | Spoofing | 5.5 | Important | No | No |
| CVE-2025-47160 | Windows Shortcut Files Security Feature Bypass Vulnerability | Security Feature Bypass | 5.4 | Important | No | No |
| CVE-2025-33069 | Windows App Control for Business Security Feature Bypass Vulnerability | Security Feature Bypass | 5.1 | Important | No | No |
| CVE-2025-47969 | Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability | Information Disclosure | 4.4 | Important | No | No |
Conclusion
June’s update, though less extensive than May’s, requires close attention from IT administrators due to the presence of 10 critical vulnerabilities and two actively discussed issues (one exploited, one publicly disclosed). Priority should be given to installing updates for Microsoft Office and SharePoint Server, as vulnerabilities in these products are traditionally used to gain access to corporate networks. Organizations should assess the risks associated with vulnerabilities of the «Denial of Service» type and take measures to protect mission‑critical network services. Timely application of patches for CVE-2025-33053 and CVE-2025-33073 is absolutely necessary to prevent potential attacks. Overall, a proactive vulnerability management strategy and automation of update processes remain best practice for maintaining infrastructure security. Public disclosure of weaknesses inevitably leads to exploit development, so delaying patch installation creates an unjustified risk.