Microsoft Patches 67 Flaws, Including Actively Exploited Zero-Days

Microsoft has released its June 2025 security update, addressing a total of 67 vulnerabilities across its product range. This month’s patch includes fixes for 11 critical vulnerabilities and 56 deemed important, offering essential protections for Windows users. However, the update also highlights a troubling trend: two of the patched flaws were already being exploited in the wild as zero-day vulnerabilities.

A zero-day vulnerability refers to a software flaw that is unknown to the vendor and for which no patch exists. This allows attackers to exploit the vulnerability before developers can address it. The fact that two such vulnerabilities were actively exploited before Microsoft released its update underscores the persistent challenges in cybersecurity.

One of the most concerning vulnerabilities, tracked as CVE-2025-33053, impacts Web Distributed Authoring and Versioning (WebDAV), an extension of HTTP. Microsoft reports that this flaw, carrying a CVSS score of 8.8, was being actively exploited by attackers who lured users into clicking malicious URLs. Once clicked, these URLs could allow for remote code execution on the victim’s machine, posing a significant threat.

Security researchers at Check Point Research, David Driker and Alexandra Gofman, discovered CVE-2025-33053. They linked its exploitation to a threat actor known as FruityArmor (also called Stealth Falcon), a group with a history of sophisticated cyberattacks. The discovery illustrates how advanced persistent threats (APTs) actively seek and exploit vulnerabilities to achieve their objectives, often targeting specific individuals or organizations.

“Finding these kinds of flaws is a constant arms race,” explains Ethan Vance, a cybersecurity consultant. “Vendors are always playing catch-up, and attackers are constantly probing for weaknesses. It’s a dynamic environment.”

The second zero-day vulnerability addressed in the June update affects the Windows SMB (Server Message Block) client. This flaw, stemming from improper access control, could allow a malicious actor on the same local network to gain elevated, even system-level, privileges on a victim’s device. This is particularlly concerning in environments like corporate networks or public Wi-Fi hotspots, where multiple devices share a network.

Earlier in the month, Microsoft had also issued patches for vulnerabilities in the Edge browser, vulnerabilities initially addressed by the Chromium project. Among these was CVE-2025-5419, another zero-day that Google had previously patched. This highlights the interconnected nature of software security, as flaws in underlying components like Chromium can have far-reaching consequences for applications built upon them.

The Silent Process → Sudden Manifestation → Public Awareness cycle is evident here. The vulnerabilities existed silently, gradually being discovered and exploited. Then, suddenly, the attacks manifested, forcing Microsoft to issue an emergency patch and raising public awareness of the risks.

The scope of the update is vast. Here’s a breakdown of the kinds of flaws addressed:

  • 14 flaws that could have led to escalation of privilege, allowing attackers to gain higher-level access.
  • 26 remote code execution vulnerabilities, which could allow attackers to run arbitrary code on a victim’s machine.
  • 17 other issues that could have led to information disclosure, potentially exposing sensitive data.

Applying these updates is crucial for all Windows users. The risk of exploiation remains untill patches are installed.

The moment things shifted,” said Maria Rodriguez, a small business owner in Phoenix, described the aftermath of a recent ransomware attack that exploited an unpatched vulnerability. “I realised how vulnerable we all are. I use to believe our antivirus was enough but, now, I ensure we apply updates as soon as they are released.”

It’s not just about big corporations; even small businesses and individual users are at risk. Cybercriminals increasingly target smaller entities, often because they lack the resources and expertise to maintain robust security practices. This is a reson the small size, limited staff, and the reliance on outdated systems make them attractive targets. Patch management is crucial.

While Microsoft’s June security update addresses a wide range of vulnerabilities, it also serves as a stark reminder of the ongoing cyber threat landscape. Users are urged to apply these updates promptly to protect themselves from potential attacks. Keep in mind to only install software from trusted sources to reduce the risk of malware infection. Stay informed about latest vulnerabilities is key.

Some user opinions expressed on X.com and Facebook have voiced concerns about the complexity of the update process, and the potential for updates to introduce new issues. Comments on Instagram, however, mainly focused on the urgency of installing the patches. Regardless, it’s clear that software vendors need to find ways to improve the user experience around security updates, making them easier to understand and apply. A reacent post highlighted a typoo, “adressing” rather than “addressing”.

Related posts

Who takes responsibility? Birmingham’s ERP extraordinary meeting

Heightened global risk pushes interest in data sovereignty

Digital Catapult sets sights on boosting AI take-up in agrifood sector