Normal view

Received yesterday — 12 December 2025

New Research: Multifunction Printer (MFP) Security Concerns within the Enterprise Business Environment

11 December 2025 at 05:57

Multifunction printers (MFPs) do far more than print. They scan, email, fax, store, and authenticate. That convenience comes with risk. Our latest report, Understanding Multifunction Printer (MFP) Security within the Enterprise Business Environment, from Rapid7’s Deral Heiland, Principal Security Researcher (IoT), and Sam Moses, Security Consultant, takes a clear look at where MFPs expand your attack surface and how to reduce that risk.

Why this research matters

MFPs are everywhere, often overlooked, and frequently underprotected. Many organizations deploy them without password changes, patch cycles, or network segmentation. Attackers notice. Because MFPs are attached to networks and can carry sensitive data, compromise can enable credential theft, data leakage, and lateral movement within the network.

The report tracks how long-standing and emerging weaknesses continue to affect MFP security. It highlights common risk areas such as weak authentication and limited patching practices, among others, that leave devices open to misuse or compromise. As these printers have grown more connected and feature-rich, the potential impact of a single vulnerable device has increased, especially when linked to core business systems or identity services.

The study also examines broader exposure trends across the enterprise landscape. Thousands of MFPs remain directly accessible from the internet, and vulnerability data shows that many models have faced serious flaws in recent years. Beyond technical issues, organizational processes like inconsistent patch management and poor decommissioning practices often allow sensitive data and credentials to linger on devices long after their use.

Penetration testing data collected by Rapid7 and Raxis confirms that these risks are not theoretical. Many organizations still deploy MFPs with default settings, leaving them open to credential theft and data access that can help attackers move deeper into the network.

The report introduces Praeda-II, a community tool designed for pentesters, auditors, and IT teams who need fast visibility into vulnerable printers, to identify risks in MFPs across modern models.

See the research

If your organization relies on networked printers, this research offers the insights you need. Read Understanding Multifunction Printer (MFP) Security within the Enterprise Business Environment to learn about key risks and practical steps to strengthen your printer security program.

Received before yesterday

Patch Tuesday - December 2025

10 December 2025 at 02:50

Microsoft is publishing a relatively light 54 new vulnerabilities this December 2025 Patch Tuesday, which is significantly lower than we have come to expect over the past couple of years. Today’s list includes two publicly disclosed remote code vulnerabilities, and a single exploited-in-the-wild vulnerability. Three critical remote code execution (RCE) vulnerabilities are also patched today; Microsoft currently assesses those as less likely or even unlikely to see exploitation. During December, Microsoft has already patched 14 browser vulnerabilities and more than 80 vulnerabilities in open source products, which are not included in the Patch Tuesday count above.

Windows Cloud Files minifilter: zero-day EoP

Microsoft has evidence that attackers are already making full use of CVE-2025-62221, a zero-day local elevation of privilege (EoP) vulnerability in the Windows Cloud Files Mini Filter Driver leading to SYSTEM privileges. File system filter drivers, aka minifilters, attach to the system software stack, and intercept requests targeted at a file system, and extend or replace the functionality provided by the original target. Typical use cases include data encryption, automated backup, on-the-fly compression, and cloud storage.

The Cloud Files minifilter is used by OneDrive, Google Drive, iCloud, and others, although as a core Windows component, it would still be present on a system where none of those apps were installed. Microsoft ranks CVE-2025-62221 as important rather than critical, since an attacker would need to have an existing foothold on the target system, but since it’s already exploited in the wild and leads to SYSTEM privileges, all but the most optimistic blue team threat models will surely treat CVE-2025-62221 as a top priority for remediation.

PowerShell: zero-day RCE

Under normal circumstances, PowerShell does a decent job of looking out for the unwary end user, and will wait for confirmation or even outright block unexpected attempts to run code from the internet that isn’t signed by a trusted publisher. Windows Mark-of-the-Web (MotW) functionality tracks files that were downloaded from the internet, but CVE-2025-54100 is a zero-day vulnerability which allows attackers to sidestep security controls that rely on MotW by the simple expedient of relying on code execution before the file is ever written. Microsoft is aware of public disclosure.

The Windows security updates published today address CVE-2025-54100 by altering the default functionality of Invoke-WebRequest in PowerShell 5.1 so that it will prompt the user, instead of simply executing potentially malicious code as it processes the full Document Object Model of the requested remote resource. Scripts that rely on the impacted functionality may hang indefinitely when encountering the new prompt, unless updated to pass the -UseBasicParsing parameter to Invoke-WebRequest, since this explicitly avoids the potential for script execution. PowerShell 7 avoids all of this by moving beyond dependency on the legacy MSHTML/Trident engine, which used to power Internet Explorer. However, PowerShell 5.1 is what’s installed by default with a fresh Windows installation, even for Server 2025 and Windows 11 25H2, because Microsoft has a hard time telling enterprise customers that continuing support for legacy business applications comes with an ever-increasing security cost.

Copilot: zero-day

The GitHub Copilot for Jetbrains plugin promises users that they can take control of their code using Copilot Edit Mode. Unfortunately, an attacker exploiting CVE-2025-64671 will be aiming to do something very similar. Microsoft is aware of public disclosure. In this scenario, cross-prompt injection, where an attacker hides malicious instructions inside a malicious file or within MCP server data, can lead to arbitrary command execution, where unsafe commands sneak past security boundaries while appended to safe, allowlisted commands. This issue is by no means specific to Copilot or Jetbrains; as the original researcher points out, this is an example of an entire class of vulnerabilities, where the addition of agentic AI to an IDE extends and alters the attack surface. Other well-known IDE vendors have assigned CVEs and/or published patches for broadly similar issues.

Office: two critical no-click RCEs

Microsoft Office is widely deployed, and it’s a rare Patch Tuesday when it doesn’t receive at least a few security updates. Two Office RCEs are particularly noteworthy this month. The advisory FAQs for both CVE-2025-62554 and CVE-2025-62557 mention that the Preview Pane is a vector, so a user who scrolls past a malicious email in Outlook or a sketchy file in Explorer could trigger exploitation without doing anything obviously wrong. However, it gets worse, because even receiving a specially-crafted email could trigger exploitation, without any requirement that the user open, read, or click on the malicious link within it. CVE-2023-23397, a widely-discussed critical Outlook vulnerability from some two-and-a-half years ago shares these characteristics. In that case, Microsoft detected in-the-wild exploitation by a Russia-based threat actor targeting government, military, and critical infrastructure targets in Europe. While there’s no suggestion that either of the vulnerabilities patched today necessarily result in NTLM hash disclosure in the same vein as CVE-2023-23397, the potential for exploitation without the need for any user interaction is a serious concern.

Microsoft lifecycle update

There are no significant Microsoft product lifecycle changes this month. Visual Studio 2022 LTSC 17.10 will reach end of life in January.

Summary charts

A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Dec
A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Dec
A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2025-Dec

Summary tables

Azure vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62550

Azure Monitor Agent Remote Code Execution Vulnerability

No

No

8.8

Browser vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62223

Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability

No

No

4.3

CVE-2025-13721

Chromium: CVE-2025-13721 Race in v8

No

No

N/A

CVE-2025-13720

Chromium: CVE-2025-13720 Bad cast in Loader

No

No

N/A

CVE-2025-13640

Chromium: CVE-2025-13640 Inappropriate implementation in Passwords

No

No

N/A

CVE-2025-13639

Chromium: CVE-2025-13639 Inappropriate implementation in WebRTC

No

No

N/A

CVE-2025-13638

Chromium: CVE-2025-13638 Use after free in Media Stream

No

No

N/A

CVE-2025-13637

Chromium: CVE-2025-13637 Inappropriate implementation in Downloads

No

No

N/A

CVE-2025-13636

Chromium: CVE-2025-13636 Inappropriate implementation in Split View

No

No

N/A

CVE-2025-13635

Chromium: CVE-2025-13635 Inappropriate implementation in Downloads

No

No

N/A

CVE-2025-13634

Chromium: CVE-2025-13634 Inappropriate implementation in Downloads

No

No

N/A

CVE-2025-13633

Chromium: CVE-2025-13633 Use after free in Digital Credentials

No

No

N/A

CVE-2025-13632

Chromium: CVE-2025-13632 Inappropriate implementation in DevTools

No

No

N/A

CVE-2025-13631

Chromium: CVE-2025-13631 Inappropriate implementation in Google Updater

No

No

N/A

CVE-2025-13630

Chromium: CVE-2025-13630 Type Confusion in V8

No

No

N/A

Mariner vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-12819

Untrusted search path in auth_query connection in PgBouncer

No

No

7.5

CVE-2025-59775

Apache HTTP Server: NTLM Leakage on Windows through UNC SSRF

No

No

7.5

CVE-2025-65082

Apache HTTP Server: CGI environment variable override

No

No

6.5

CVE-2025-66200

Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo

No

No

5.4

Microsoft Office vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-64672

Microsoft SharePoint Server Spoofing Vulnerability

No

No

8.8

CVE-2025-62554

Microsoft Office Remote Code Execution Vulnerability

No

No

8.4

CVE-2025-62557

Microsoft Office Remote Code Execution Vulnerability

No

No

8.4

CVE-2025-62558

Microsoft Word Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62559

Microsoft Word Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62562

Microsoft Outlook Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62561

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62563

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62564

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62553

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62556

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62560

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62552

Microsoft Access Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62555

Microsoft Word Remote Code Execution Vulnerability

No

No

7

Open Source Software vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-40244

hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()

No

No

9.8

CVE-2025-40242

gfs2: Fix unlikely race in gdlm_put_lock

No

No

9.8

CVE-2025-40251

devlink: rate: Unset parent pointer in devl_rate_nodes_destroy

No

No

9.8

CVE-2025-40262

Input: imx_sc_key - fix memory corruption on unload

No

No

9.8

CVE-2025-40240

sctp: avoid NULL dereference when chunk data buffer is missing

No

No

8.6

CVE-2025-40314

usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget

No

No

7.8

CVE-2025-40223

most: usb: Fix use-after-free in hdm_disconnect

No

No

7.8

CVE-2025-40272

mm/secretmem: fix use-after-free race in fault handler

No

No

7.8

CVE-2025-40319

bpf: Sync pending IRQ work before freeing ring buffer

No

No

7.8

CVE-2025-66476

Vim for Windows Uncontrolled Search Path Element Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-40277

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

No

No

7.3

CVE-2023-53749

x86: fix clear_user_rep_good() exception handling annotation

No

No

7.1

CVE-2025-40233

ocfs2: clear extent cache after moving/defragmenting extents

No

No

7.1

CVE-2025-40312

jfs: Verify inode mode when loading from disk

No

No

7.1

CVE-2025-40322

fbdev: bitblit: bound-check glyph index in bit_putcs*

No

No

7.1

CVE-2025-40266

KVM: arm64: Check the untrusted offset in FF-A memory share

No

No

7.1

CVE-2025-40301

Bluetooth: hci_event: validate skb length for unknown CC opcode

No

No

7.1

CVE-2025-40283

Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF

No

No

7.1

CVE-2025-40292

virtio-net: fix received length check in big packets

No

No

7

CVE-2025-40280

tipc: Fix use-after-free in tipc_mon_reinit_self().

No

No

7

CVE-2025-40281

sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto

No

No

7

CVE-2025-40297

net: bridge: fix use-after-free due to MST port state bypass

No

No

7

CVE-2025-40258

mptcp: fix race condition in mptcp_schedule_work()

No

No

7

CVE-2025-40273

NFSD: free copynotify stateid in nfs4_free_ol_stateid()

No

No

7

CVE-2025-40305

9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN

No

No

7

CVE-2025-40261

nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()

No

No

6.6

CVE-2025-40243

hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()

No

No

6.6

CVE-2025-40321

wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode

No

No

6.5

CVE-2025-40248

vsock: Ignore signal/timeout on connect() if already established

No

No

6.3

CVE-2025-40257

mptcp: fix a race in mptcp_pm_del_add_timer()

No

No

6.3

CVE-2025-40259

scsi: sg: Do not sleep in atomic context

No

No

6.2

CVE-2025-40252

net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()

No

No

6.1

CVE-2025-40215

xfrm: delete x->tunnel as we delete x

No

No

5.5

CVE-2025-40315

usb: gadget: f_fs: Fix epfile null pointer access after ep enable.

No

No

5.5

CVE-2025-40285

smb/server: fix possible refcount leak in smb2_sess_setup()

No

No

5.5

CVE-2025-40286

smb/server: fix possible memory leak in smb2_read()

No

No

5.5

CVE-2025-40253

s390/ctcm: Fix double-kfree

No

No

5.5

CVE-2025-40317

regmap: slimbus: fix bus_context pointer in regmap init calls

No

No

5.5

CVE-2025-40217

pidfs: validate extensible ioctls

No

No

5.5

CVE-2025-40306

orangefs: fix xattr related buffer overflow...

No

No

5.5

CVE-2025-40313

ntfs3: pretend $Extend records as regular files

No

No

5.5

CVE-2025-40245

nios2: ensure that memblock.current_limit is set when setting pfn limits

No

No

5.5

CVE-2025-40278

net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak

No

No

5.5

CVE-2025-40279

net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

No

No

5.5

CVE-2025-40254

net: openvswitch: remove never-working support for setting nsh fields

No

No

5.5

CVE-2025-40250

net/mlx5: Clean up only new IRQ glue on request_irq() failure

No

No

5.5

CVE-2025-40293

iommufd: Don't overflow during division for dirty tracking

No

No

5.5

CVE-2025-40220

fuse: fix livelock in synchronous file put from fuseblk workers

No

No

5.5

CVE-2025-40304

fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds

No

No

5.5

CVE-2025-40323

fbcon: Set fb_display[i]->mode to NULL when the mode is released

No

No

5.5

CVE-2025-40307

exfat: validate cluster allocation bits of the allocation bitmap

No

No

5.5

CVE-2025-40287

exfat: fix improper check of dentry.stream.valid_size

No

No

5.5

CVE-2025-40247

drm/msm: Fix pgtable prealloc error path

No

No

5.5

CVE-2025-40289

drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM

No

No

5.5

CVE-2025-40268

cifs: client: fix memory leak in smb3_fs_context_parse_param

No

No

5.5

CVE-2025-40303

btrfs: ensure no dirty metadata is written back for an fs with errors

No

No

5.5

CVE-2025-40264

be2net: pass wrb_params in case of OS2BMC

No

No

5.5

CVE-2025-40310

amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw

No

No

5.5

CVE-2025-40311

accel/habanalabs: support mapping cb with vmalloc-backed coherent memory

No

No

5.5

CVE-2025-40219

PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV

No

No

5.5

CVE-2025-40324

NFSD: Fix crash in nfsd4_read_release()

No

No

5.5

CVE-2025-40263

Input: cros_ec_keyb - fix an invalid memory access

No

No

5.5

CVE-2025-40308

Bluetooth: bcsp: receive data only if registered

No

No

5.5

CVE-2025-40309

Bluetooth: SCO: Fix UAF on sco_conn_free

No

No

5.5

CVE-2025-40284

Bluetooth: MGMT: cancel mesh send timer when hdev removed

No

No

5.5

CVE-2025-40294

Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()

No

No

5.5

CVE-2025-40282

Bluetooth: 6lowpan: reset link-local header on ipv6 recv path

No

No

5.5

CVE-2025-40275

ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd

No

No

5.5

CVE-2025-40288

drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices

No

No

4.7

CVE-2025-40269

ALSA: usb-audio: Fix potential overflow of PCM transfer buffer

No

No

4.3

CVE-2025-40218

mm/damon/vaddr: do not repeat pte_offset_map_lock() until success

No

No

4.1

CVE-2025-12385

Improper validation of  tag size in Text component parser

No

No

N/A

Open Source Software Mariner vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-61729

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

No

No

7.5

CVE-2025-66293

LIBPNG has an out-of-bounds read in png_image_read_composite

No

No

7.1

CVE-2025-61727

Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509

No

No

6.5

CVE-2025-65637

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters.

No

No

5.9

CVE-2025-12084

Quadratic complexity in node ID cache clearing

No

No

N/A

CVE-2025-13837

Out-of-memory when loading Plist

No

No

N/A

CVE-2025-34297

KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc

No

No

N/A

CVE-2025-13836

Excessive read buffering DoS in http.client

No

No

N/A

Other vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-64671

GitHub Copilot for Jetbrains Remote Code Execution Vulnerability

No

Yes

8.4

Server Software ESU vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-64666

Microsoft Exchange Server Elevation of Privilege Vulnerability

No

No

7.5

CVE-2025-64667

Microsoft Exchange Server Spoofing Vulnerability

No

No

5.3

Windows vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62456

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-64673

Windows Storage VSP Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59516

Windows Storage VSP Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59517

Windows Storage VSP Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-64661

Windows Shell Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62461

Windows Projected File System Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62462

Windows Projected File System Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62464

Windows Projected File System Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55233

Windows Projected File System Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62467

Windows Projected File System Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-64679

Windows DWM Core Library Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-64680

Windows DWM Core Library Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62454

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62457

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62221

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Yes

No

7.8

CVE-2025-62572

Application Information Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-64658

Windows File Explorer Elevation of Privilege Vulnerability

No

No

7.5

CVE-2025-62565

Windows File Explorer Elevation of Privilege Vulnerability

No

No

7.3

CVE-2025-62570

Windows Camera Frame Server Monitor Information Disclosure Vulnerability

No

No

7.1

CVE-2025-62469

Microsoft Brokering File System Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62569

Microsoft Brokering File System Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62573

DirectX Graphics Kernel Elevation of Privilege Vulnerability

No

No

7

CVE-2025-64670

Windows DirectX Information Disclosure Vulnerability

No

No

6.5

CVE-2025-62463

DirectX Graphics Kernel Denial of Service Vulnerability

No

No

6.5

CVE-2025-62465

DirectX Graphics Kernel Denial of Service Vulnerability

No

No

6.5

CVE-2025-62468

Windows Defender Firewall Service Information Disclosure Vulnerability

No

No

4.4

Windows ESU vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62549

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-64678

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-62472

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62474

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62571

Windows Installer Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62470

Windows Common Log File System Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62466

Windows Client-Side Caching Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62458

Win32k Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-54100

PowerShell Remote Code Execution Vulnerability

No

Yes

7.8

CVE-2025-62455

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-62473

Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

No

No

6.5

CVE-2025-62567

Windows Hyper-V Denial of Service Vulnerability

No

No

5.3

Patch Tuesday - November 2025

11 November 2025 at 15:58

Microsoft is publishing 66 new vulnerabilities today, which is far fewer than we’ve come to expect in recent months. There’s a lone exploited-in-the-wild zero-day vulnerability, which Microsoft assesses as critical severity, although there’s apparently no public disclosure yet. Three critical remote code execution (RCE) vulnerabilities are patched today; happily, Microsoft currently assesses all three as less likely to see exploitation. Five browser vulnerabilities and a dozen or so fixes for Azure Linux (aka Mariner) have already been published separately this month, and are not included in the total.

Windows GDI+: critical 0-day RCE

Faced with a fresh stack of Patch Tuesday vulns, there are a few different ways to prioritize our analysis. Do we start with vulns exploited in the wild? Pre-authentication RCEs? The vuln with the highest CVSS base score? The vuln which is likely to affect just about every asset running Microsoft software? Any of these are sensible avenues of approach, and today, all roads lead to CVE-2025-60724. As the advisory notes, in the worst-case scenario, an attacker could exploit this vulnerability by uploading a malicious document to a vulnerable web service. The advisory doesn’t spell out the context of code execution, but if all the stars align for the attacker, the prize could be remote code execution as SYSTEM via the network without any need for an existing foothold. While this vuln almost certainly isn’t wormable, it’s clearly very serious and is surely a top priority for just about anyone considering how to approach this month’s patches.

The weakness underlying CVE-2025-60724 is CWE-122: Heap-based buffer overflow, a concept which celebrated its 50th birthday several years ago. As the authors of the original 1972 paper noted: “If the code makes use of an internal buffer, there is a possibility that a user could input enough data to overwrite other portions of the program's private storage.” Regarding computer security in general, they opined that “this problem is neither hopeless nor solved. It is, however, perfectly clear [...] that solutions to the problem will not occur spontaneously, nor will they come from the various well-intentioned attempts to provide security as an add-on to existing systems.”

Office: critical ACE

Once again, we find ourselves wondering: “when is remote code execution really remote?” CVE-2025-62199 describes a critical RCE vulnerability in Microsoft Office, where exploitation relies on the user downloading and opening a malicious file. The attacker is remote, and that’s enough to satisfy the definition, even if the action is taken on the local system by the unwitting user. Anyone hoping that the Preview Pane is not a vector will be sadly disappointed, and this certainly increases the probability of real-world exploitation, since there’s no need for the attacker to craft a way around those pesky warnings about enabling dangerous content. Just scrolling through a list of emails in Outlook could be enough.

Visual Studio: critical RCE

Some attacks are straightforward, with only a single step needed to reach the finish line. Others, like Visual Studio critical RCE CVE-2025-62214, require that the attacker execute a complex chain of events. In this case, exploitation demands multi-stage abuse of recent advances in Visual Studio AI development capabilities, including prompt injection, Agent interaction, and triggering a build. The advisory doesn’t describe the context of code execution. If the prize is simply code execution on an asset in the context of the user, there’s no obvious advancement for the attacker, since exploitation already requires code execution on the asset by the attacker or the targeted user. The brief description of the attack chain does mention that the attacker would need to trigger a build. On that basis, possible outcomes might include execution in an elevated context, or compromised build artifacts, although the advisory does not provide enough information to be certain either way.

SQL Server: critical EoP

SQL Server admins should take note of CVE-2025-59499, which describes an elevation of privilege (EoP) vulnerability. Although some level existing privileges are required, successful exploitation will permit an attacker to run arbitrary Transact-SQL (T-SQL) commands. T-SQL is the language which SQL Server databases and clients use to communicate with one another. Although the default configuration for SQL Server disables the xp_cmdshell functionality which allows direct callouts to the underlying OS, there’s more than one way to shine a penny, and the only safe assumption here is that exploitation will lead to code execution in the context of SQL Server itself. Patches are available for all supported versions of SQL Server.

Microsoft lifecycle update

Following the sweeping lifecycle changes seen in October 2025, Microsoft is taking it fairly easy this month. The only significant transition today is the end of support for Windows 11 Home and Pro 23H2. Unlike the demise of Windows 10, this much smaller change won’t affect most people; a small number of older CPUs might not make the cut, since Windows 11 24H2 introduces a requirement for a couple of newer CPU instruction sets. Microsoft provides lists of compatible Intel, AMD, and Qualcomm CPU series.

Summary charts

A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Nov

A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Nov

A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Nov

Summary tables

Azure vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59504

Azure Monitor Agent Remote Code Execution Vulnerability

No

No

7.3

Browser vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-12729

Chromium: CVE-2025-12729 Inappropriate implementation in Omnibox

No

No

N/A

CVE-2025-12728

Chromium: CVE-2025-12728 Inappropriate implementation in Omnibox

No

No

N/A

CVE-2025-12727

Chromium: CVE-2025-12727 Inappropriate implementation in V8

No

No

N/A

CVE-2025-12726

Chromium: CVE-2025-12726 Inappropriate implementation in Views.

No

No

N/A

CVE-2025-12725

Chromium: CVE-2025-12725 Out of bounds write in WebGPU

No

No

N/A

Developer Tools vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62222

Agentic AI and Visual Studio Code Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-62449

Microsoft Visual Studio Code CoPilot Chat Extension Security Feature Bypass Vulnerability

No

No

6.8

CVE-2025-62214

Visual Studio Remote Code Execution Vulnerability

No

No

6.7

CVE-2025-62453

GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability

No

No

5

Mariner Open Source Software vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2024-25621

containerd affected by a local privilege escalation via wide permissions on CRI directory

No

No

7.3

CVE-2025-10966

missing SFTP host verification with wolfSSH

No

No

6.8

CVE-2025-64329

containerd CRI server: Host memory exhaustion through Attach goroutine leak

No

No

N/A

Microsoft Dynamics vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62210

Dynamics 365 Field Service (online) Spoofing Vulnerability

No

No

8.7

CVE-2025-62211

Dynamics 365 Field Service (online) Spoofing Vulnerability

No

No

8.7

CVE-2025-62206

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

No

No

6.5

Microsoft Office vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62204

Microsoft SharePoint Remote Code Execution Vulnerability

No

No

8

CVE-2025-62199

Microsoft Office Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62216

Microsoft Office Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62205

Microsoft Office Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-60727

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62200

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62201

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-62203

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-60726

Microsoft Excel Information Disclosure Vulnerability

No

No

7.1

CVE-2025-62202

Microsoft Excel Information Disclosure Vulnerability

No

No

7.1

CVE-2025-60722

Microsoft OneDrive for Android Elevation of Privilege Vulnerability

No

No

6.5

CVE-2025-59240

Microsoft Excel Information Disclosure Vulnerability

No

No

5.5

CVE-2025-60728

Microsoft Excel Information Disclosure Vulnerability

No

No

4.3

Open Source Software vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62220

Windows Subsystem for Linux GUI Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-12863

Libxml2: namespace use-after-free in xmlsettreedoc() function of libxml2

No

No

7.5

CVE-2025-64433

KubeVirt Arbitrary Container File Read

No

No

6.5

CVE-2025-40107

can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled

No

No

5.5

CVE-2025-60753

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

No

No

5.5

CVE-2025-12875

mruby array.c ary_fill_exec out-of-bounds write

No

No

5.3

CVE-2025-64435

KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation

No

No

5.3

CVE-2025-64437

KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes

No

No

5

CVE-2025-64434

KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing

No

No

4.7

CVE-2025-64432

KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer

No

No

4.7

CVE-2025-40109

crypto: rng - Ensure set_ent is always present

No

No

4.2

CVE-2025-52881

runc: LSM labels can be bypassed with malicious config using dummy procfs files

No

No

N/A

CVE-2025-31133

runc container escape via "masked path" abuse due to mount race conditions

No

No

N/A

CVE-2025-52565

container escape due to /dev/console mount and related races

No

No

N/A

CVE-2025-64436

KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes

No

No

N/A

Other vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-30398

Nuance PowerScribe 360 Information Disclosure Vulnerability

No

No

8.1

SQL Server vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59499

Microsoft SQL Server Elevation of Privilege Vulnerability

No

No

8.8

System Center vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-47179

Configuration Manager Elevation of Privilege Vulnerability

No

No

6.7

Windows vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59511

Windows WLAN Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60713

Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60718

Windows Administrator Protection Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60721

Windows Administrator Protection Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60707

Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60710

Host Process for Windows Tasks Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59507

Windows Speech Runtime Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59508

Windows Speech Recognition Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62215

Windows Kernel Elevation of Privilege Vulnerability

Yes

No

7

CVE-2025-59515

Windows Broadcast DVR User Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-60717

Windows Broadcast DVR User Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62218

Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62219

Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability

No

No

7

CVE-2025-60716

DirectX Graphics Kernel Elevation of Privilege Vulnerability

No

No

7

CVE-2025-60708

Storvsp.sys Driver Denial of Service Vulnerability

No

No

6.5

CVE-2025-60723

DirectX Graphics Kernel Denial of Service Vulnerability

No

No

6.3

CVE-2025-59509

Windows Speech Recognition Information Disclosure Vulnerability

No

No

5.5

CVE-2025-62208

Windows License Manager Information Disclosure Vulnerability

No

No

5.5

CVE-2025-62209

Windows License Manager Information Disclosure Vulnerability

No

No

5.5

CVE-2025-60706

Windows Hyper-V Information Disclosure Vulnerability

No

No

5.5

CVE-2025-60724

GDI+ Remote Code Execution Vulnerability

Yes

No

9.8

Windows ESU vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-62452

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

No

No

8

CVE-2025-60715

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

No

No

8

CVE-2025-60720

Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59505

Windows Smart Card Reader Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60703

Windows Remote Desktop Services Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60714

Windows OLE Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-60709

Windows Common Log File System Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60705

Windows Client-Side Caching Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59514

Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59512

Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-60704

Windows Kerberos Elevation of Privilege Vulnerability

No

No

7.5

CVE-2025-60719

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62217

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

No

No

7

CVE-2025-62213

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59506

DirectX Graphics Kernel Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59510

Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability

No

No

5.5

CVE-2025-59513

Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability

No

No

5.5

CVE-2025-60724

GDI+ Remote Code Execution Vulnerability

Yes

No

9.8

Windows Microsoft Office ESU vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-60724

GDI+ Remote Code Execution Vulnerability

No

No

9.8

Updates

  • 2025-11-11: clarified the description of CVE-2025-62214.

The Hidden Cost of Vulnerability Backlogs—And How to Eliminate Them

19 November 2025 at 00:26

Vulnerability Backlogs

Striving for digital transformation, organizations are innovating at an incredibly fast pace. They deploy new applications, services, and platforms daily, creating great opportunities for growth and efficiency. However, this speedy transformation comes with a significant, often overlooked, consequence: an accumulated massive vulnerability backlog. This ever-expanding list of unpatched software flaws, system misconfigurations, and coding errors is a silent drain on an organization's most valuable resources.  For many IT and security teams, the vulnerability backlog is a source of constant pressure and a seemingly unwinnable battle. As soon as they deploy one batch of patches, a new wave of critical vulnerabilities is disclosed.   This reactive cybersecurity approach is both unsustainable and incredibly costly. The true price of a vulnerability backlog extends far beyond the person-hours spent on patching. It manifests as operational friction, stifled innovation, employee burnout, and a persistent, elevated risk of a catastrophic cyberattack  To truly secure the modern enterprise, leaders must look beyond traditional scanning and patching cycles and embrace a new, proactive paradigm for vulnerability management. 

The Anatomy of a Swelling Vulnerability Backlog

A vulnerability backlog is the aggregate of all known but unaddressed security weaknesses within an organization’s IT environment. These weaknesses can range from critical flaws in open-source libraries and commercial software to misconfigured cloud services and insecure code pushed during quick development cycles.  There are three principal reasons the backlog grows incessantly: 
  1. The sheer volume of newly discovered vulnerabilities, numbering in the tens of thousands each year
  2. The complexity of modern, hybrid environments, where assets are spread across on-premises data centers and multiple cloud providers
  3. The monumental challenge of tracking and patching every critical vulnerability
The growing mountain of security weaknesses creates a form of vulnerability debt. It accumulates when you defer patching due to operational constraints, resource limitations, or the fear of breaking critical applications.  The longer a vulnerability remains unpatched, the more time attackers have to develop exploits and launch attacks and turn even a low-priority issue into a full-blown crisis. 

The True, Multifaceted Cost of Inaction 

The costs associated with a large vulnerability backlog are both direct and indirect, affecting your organization’s financial health, operational agility, and human capital. 

Financial and Operational Drains 

The most obvious cost is the direct expense of remediation. That includes the salaries of security professionals who spend countless hours identifying, prioritizing, and deploying patches.  However, the indirect costs are often far greater. Developer productivity plummets when teams are constantly pulled away from building new features to address security issues. It affects the time-to-market for new products and services, handing an advantage to more agile competitors.  In case of a breach from an unpatched vulnerability, the financial fallout can be devastating. It can encompass everything from regulatory fines and legal fees to customer compensation and a drop in stock value. 

The Human Toll 

Beyond the financial and operational impact is the human cost. When security teams drown in a sea of alerts, alert fatigue is unavoidable. And with it, missed critical warnings amidst the terrible alert noise, too.  The constant pressure and the feeling of being perpetually behind contribute to high levels of stress and burnout, resulting in the high turnover of skilled security talent. And here is your vicious cycle: experienced professionals leave; the remaining team is stretched even thinner; and the backlog continues to grow.  This state can also strain the relationship between security, development, and operations teams, preventing the collaboration necessary for a healthy DevSecOps culture. 

From a Reactive to a Proactive Protection 

Instead of “How can we patch faster?”, the more effective question is, “How can we neutralize security risk before we patch vulnerabilities?”.  The answer lies in moving from a predominantly reactive posture revolving around patching and response to a proactive one centered around mitigation. A robust patchless mitigation platform can effectively shield your organization’s environment from exploitation, regardless of the length of your patching cycles.  For instance, Virsec provides powerful compensating controls that prevent malicious actors from exploiting a vulnerability even if it is there and unpatched.  This approach decouples cybersecurity protection from the act of patching. It gives teams the breathing room to remediate vulnerabilities in a planned, methodical way without leaving critical systems exposed to immediate threats.  Applying these mitigation controls at scale is where the smart application of artificial intelligence becomes essential. AI-driven security tools can automate burdensome tasks in security operations centers (SOCs) and security teams.  As an illustration, Virsec’s OTTOGUARD.AI leverages agentic AI to improve security operations’ efficiency in the following way: 
  1. AI agents autonomously deploy and configure security probes to determine which code and software to trust.
  2. They integrate with your existing cybersecurity tool stack to analyze telemetry, assess your risk environment, and identify assets that can be protected immediately (without patching).
  3. They then interface with IT service management platforms, such as ServiceNow, presenting human experts with validated remediation and patching solutions for the remaining issues. Human experts have the final word, reviewing the suggested solutions and deciding whether to act on them.

Foster a Culture of Shared Responsibility 

Technology alone is not a panacea. The most effective vulnerability management programs stand on a strong security culture that breaks down silos between development, security, and operations.  Hence, before anything else, strive to build this culture of collaboration and unified goals. It will inevitably instill a sense of shared responsibility for your organization’s security posture and motivate every individual to be a proactive guardian against threats. 

Final Thoughts 

By combining proactive protection with AI-driven automation and a culture of shared responsibility, organizations can begin to tame their vulnerability backlogs.  This multi-layered approach helps you reduce the risk of a breach, frees up valuable resources, accelerates innovation, and builds a more resilient and future-proof enterprise.  Its goal is to transform security from a cost center and a source of friction into a true business enabler. Because that's what cybersecurity really is: an essential business enabler that makes it possible for organizations to innovate with confidence in an increasingly complex digital world. 

Enterprise Vulnerability Management: A Comprehensive Guide

Learn about enterprise vulnerability management, its components, challenges, and best practices for Enterprise SSO, Enterprise Ready, and CIAM environments. Enhance your organization's security posture.

The post Enterprise Vulnerability Management: A Comprehensive Guide appeared first on Security Boulevard.

Patch Tuesday - June 2025

10 June 2025 at 16:08
Patch Tuesday - June 2025

Microsoft is addressing 67 vulnerabilities this June 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for just one of the vulnerabilities published today, and that is reflected in CISA KEV. Separately, Microsoft is aware of existing public disclosure for one other freshly published vulnerability. Microsoft’s luck holds for a ninth consecutive Patch Tuesday, since neither of today’s zero-day vulnerabilities are evaluated as critical severity at time of publication. Today also sees the publication of eight critical remote code execution (RCE) vulnerabilities. Two browser vulnerabilities have already been published separately this month, and are not included in the total.

Windows WebDAV: zero-day RCE

Remember the WebDAV standard? It has been seven years since Microsoft has published a vulnerability in the Windows implementation of WebDAV, and today’s publication of CVE-2025-33053 is the first zero-day vulnerability on record. Originally dreamed up in the 1990s to support interactivity on the web, WebDAV may be familiar to Exchange admins and users of a certain vintage, since older versions of Exchange, up to and including Exchange Server 2010, supported WebDAV as a means for interacting with mailboxes and public folders.

It will surprise no one that Windows still more or less supports WebDAV, and that turns out to be a bit of a problem. Microsoft acknowledges Check Point Research (CPR) on the advisory; CPR in turn attributes exploitation of CVE-2025-33053 to an APT, which they track as Stealth Falcon, an established threat actor with a long-running interest in governments and government-adjacent entities across the Middle East and the surrounding area.

Curiously, the Microsoft advisory does not mention that the Windows implementation of WebDAV is listed as deprecated since November 2023, which in practical terms means that the WebClient service no longer starts by default. The advisory also has attack complexity as low, which means that exploitation does not require preparation of the target environment in any way that is beyond the attacker’s control. Exploitation relies on the user clicking a malicious link. It’s not clear how an asset would be immediately vulnerable if the service isn’t running, but all versions of Windows receive a patch, including those released since the deprecation of WebClient, like Server 2025 and Windows 11 24H2. On Server 2025, for instance, it’s still possible to install the WebDAV Redirector server feature, which then causes the WebClient service to appear.

SMB client: zero-day EoP

Publicly disclosed elevation of privilege (EoP) zero-day vulnerabilities that lead to SYSTEM are always going to be worth a closer look, and CVE-2025-33073 is no exception. The advisory sets out that the easiest path to exploitation simply requires the user to connect to a malicious SMB server controlled by the attacker. It’s not entirely clear from the advisory whether simply connecting is enough to trigger exploitation, or whether successful authentication is required, since there is currently conflicting language in two separate FAQ entries with almost-identical titles: “How could an attacker exploit this/the vulnerability?” It may well be that Microsoft will come back around and clarify this wording, but in the meantime the only safe assumption is that fortune favours the attacker.

Windows KDC Proxy: critical RCE

The Windows KDC Proxy Service (KPSSVC) receives a patch today for CVE-2025-33071, which describes a critical unauthenticated RCE vulnerability where exploitation is via abuse of a cryptographic protocol weakness. The good news is that only Windows Server assets configured as a Kerberos Key Distribution Center Proxy Protocol server — happily, this is not enabled as standard configuration for a domain controller — and exploitation requires that the attacker win a race condition. The bad news is that Microsoft considers exploitation more likely regardless, and since a KDC proxy helps Kerberos requests from untrusted networks more easily access trusted assets without any need for a direct TCP connection from the client to the domain controller, the trade-off here is that the KDC proxy itself is quite likely to be exposed to an untrusted network. Patching this vulnerability should be top of mind for affected defenders this month.

Office preview pane: trio of critical RCEs

Microsoft expects that exploitation of three Office critical RCE vulns patched today is more likely. CVE-2025-47162, CVE-2025-47164, and CVE-2025-47167 share several attributes: each was discovered by prolific researcher 0x140ce, who topped the MSRC 2025 Q1 leaderboard, and each includes the Preview Pane as a vector, which always ups the ante for defenders. Admins responsible for installations of Microsoft 365 Apps for Enterprise — also confusingly referred to as “Microsoft 365 for Office” in the advisory FAQ — will have to hang on, since patches for today’s vulnerabilities aren’t yet available for that particular facet of the Microsoft 365 kaleidoscope.

Microsoft lifecycle update

June is a quiet month for Microsoft product lifecycle changes. The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when the SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.

Patch Tuesday - June 2025
Patch Tuesday - June 2025
Patch Tuesday - June 2025

Summary tables

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47977 Nuance Digital Engagement Platform Spoofing Vulnerability No No 7.6

Browser vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-5419 Chromium: CVE-2025-5419 Out of bounds read and write in V8 No No N/A
CVE-2025-5068 Chromium: CVE-2025-5068 Use after free in Blink No No N/A

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47962 Windows SDK Elevation of Privilege Vulnerability No No 7.8
CVE-2025-30399 .NET and Visual Studio Remote Code Execution Vulnerability No No 7.5
CVE-2025-47959 Visual Studio Remote Code Execution Vulnerability No No 7.1

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47966 Power Automate Elevation of Privilege Vulnerability No No 9.8

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47172 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-47163 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-47166 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 8.8
CVE-2025-47957 Microsoft Word Remote Code Execution Vulnerability No No 8.4
CVE-2025-47162 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47953 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47164 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47167 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-47168 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-47169 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-47170 Microsoft Word Remote Code Execution Vulnerability No No 7.8
CVE-2025-47175 Microsoft PowerPoint Remote Code Execution Vulnerability No No 7.8
CVE-2025-47176 Microsoft Outlook Remote Code Execution Vulnerability No No 7.8
CVE-2025-47173 Microsoft Office Remote Code Execution Vulnerability No No 7.8
CVE-2025-47165 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-47174 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-47968 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability No No 7.8
CVE-2025-47171 Microsoft Outlook Remote Code Execution Vulnerability No No 6.7

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-33067 Windows Task Scheduler Elevation of Privilege Vulnerability No No 8.4
CVE-2025-29828 Windows Schannel Remote Code Execution Vulnerability No No 8.1
CVE-2025-32725 DHCP Server Service Denial of Service Vulnerability No No 7.5
CVE-2025-33050 DHCP Server Service Denial of Service Vulnerability No No 7.5
CVE-2025-32721 Windows Recovery Driver Elevation of Privilege Vulnerability No No 7.3
CVE-2025-32719 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33058 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33059 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33061 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33062 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33063 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33065 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-24068 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-24069 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-24065 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33055 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-47956 Windows Security App Spoofing Vulnerability No No 5.5
CVE-2025-33052 Windows DWM Core Library Information Disclosure Vulnerability No No 5.5
CVE-2025-33069 Windows App Control for Business Security Feature Bypass Vulnerability No No 5.1
CVE-2025-47969 Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability No No 4.4

Windows ESU vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-33073 Windows SMB Client Elevation of Privilege Vulnerability No Yes 8.8
CVE-2025-33064 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 8.8
CVE-2025-33066 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability No No 8.8
CVE-2025-33053 Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability Yes No 8.8
CVE-2025-32710 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 8.1
CVE-2025-33070 Windows Netlogon Elevation of Privilege Vulnerability No No 8.1
CVE-2025-33071 Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability No No 8.1
CVE-2025-32718 Windows SMB Client Elevation of Privilege Vulnerability No No 7.8
CVE-2025-47955 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32716 Windows Media Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32714 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-33075 Windows Installer Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32713 Windows Common Log File System Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32712 Win32k Elevation of Privilege Vulnerability No No 7.8
CVE-2025-33068 Windows Standards-Based Storage Management Service Denial of Service Vulnerability No No 7.5
CVE-2025-33056 Windows Local Security Authority (LSA) Denial of Service Vulnerability No No 7.5
CVE-2025-32724 Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability No No 7.5
CVE-2025-3052 Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass No No 6.7
CVE-2025-33057 Windows Local Security Authority (LSA) Denial of Service Vulnerability No No 6.5
CVE-2025-32715 Remote Desktop Protocol Client Information Disclosure Vulnerability No No 6.5
CVE-2025-32722 Windows Storage Port Driver Information Disclosure Vulnerability No No 5.5
CVE-2025-32720 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-33060 Windows Storage Management Provider Information Disclosure Vulnerability No No 5.5
CVE-2025-47160 Windows Shortcut Files Security Feature Bypass Vulnerability No No 5.4

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now
❌