Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day

Microsoft has released its Patch Tuesday updates for May 2025, addressing a total of 78 vulnerabilities across its product ecosystem, with five identified as actively exploited zero-day flaws. The updates cover a wide range of software, including Windows, Microsoft Office, Azure, Visual Studio, and more, urging users and administrators to apply patches immediately to mitigate […] The post Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day appeared first on Cyber Security News.

May 13, 2025 - 21:08
 0
Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day

Microsoft has released its Patch Tuesday updates for May 2025, addressing a total of 78 vulnerabilities across its product ecosystem, with five identified as actively exploited zero-day flaws.

The updates cover a wide range of software, including Windows, Microsoft Office, Azure, Visual Studio, and more, urging users and administrators to apply patches immediately to mitigate potential risks.

Out of 72 vulnerabilities, Microsoft fixes 29 Remote Code Execution, 18 Elevation of Privilege, 14 Information Disclosure, 7 Denial of Service, 2 Spoofing, and 2 Security Feature Bypass.

Critical Zero-Day Vulnerabilities Under Active Exploitation

Five vulnerabilities patched this month were confirmed to be actively exploited in the wild, posing immediate threats to organizations and individuals. These zero-days include:

  1. CVE-2025-30397 (Microsoft Scripting Engine) – With a CVSS score of 7.5, this flaw allows attackers to execute malicious code via specially crafted web content. Exploitation has been detected, and Microsoft strongly recommends immediate patching.
  2. CVE-2025-30400 (Windows DWM) – Scoring 7.8, this vulnerability in the Windows Desktop Window Manager could allow attackers to gain elevated privileges, with confirmed exploitation in the wild.
  3. CVE-2025-32701 (Windows Common Log File System Driver) – Also rated 7.8, this flaw enables privilege escalation and has been actively exploited, posing risks to system integrity.
  4. CVE-2025-32706 (Windows Common Log File System Driver) – Another privilege escalation vulnerability with a 7.8 CVSS score, actively exploited and requiring urgent attention.
  5. CVE-2025-32709 (Windows Ancillary Function Driver for WinSock) – Rated 7.8, this flaw allows attackers to escalate privileges and has been confirmed as exploited.

Office and Windows Vulnerabilities

Microsoft Office products, particularly Excel and SharePoint, were heavily impacted, with multiple vulnerabilities rated 7.8 or higher. For example:

  • CVE-2025-29976 (Microsoft Office SharePoint) – A 7.8-rated flaw that could allow attackers to escalate privileges locally.
  • CVE-2025-30393 (Microsoft Office Excel) – One of several Excel vulnerabilities, rated 7.8, that could lead to remote code execution via malicious files.

Windows components also saw significant patches, with vulnerabilities in the Windows Kernel, Remote Desktop Gateway Service, and Routing and Remote Access Service (RRAS). Notably, CVE-2025-24063 (Windows Kernel), rated 7.8, is considered “Exploitation More Likely,” highlighting the need for prompt updates.

Microsoft Patch Tuesday May 2025 Vulnerability List

CVE NumberCVE TitleImpactMax Severity
CVE-2025-29966Remote Desktop Client Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-29967Remote Desktop Client Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-30377Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-30386Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-29833Microsoft Virtual Machine Bus (VMBus) Remote Code Execution VulnerabilityRemote Code ExecutionCritical
CVE-2025-26629Microsoft Office Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-26646.NET, Visual Studio, and Build Tools for Visual Studio Spoofing VulnerabilitySpoofingImportant
CVE-2025-26684Microsoft Defender Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29959Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29960Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29964Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29968Active Directory Certificate Services (AD CS) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29969MS-EVEN RPC Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29970Microsoft Brokering File System Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29973Microsoft Azure File Sync Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29971Web Threat Defense (WTD.sys) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29975Microsoft PC Manager Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29976Microsoft SharePoint Server Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29977Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29978Microsoft PowerPoint Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29979Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30375Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30376Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30378Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30379Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30381Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30382Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30383Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30384Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30387Document Intelligence Studio On-Prem Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-27468Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-30393Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29826Microsoft Dataverse Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-30394Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-30400Microsoft DWM Core Library Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-32701Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-32703Visual Studio Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-32706Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-21264Visual Studio Code Security Feature Bypass VulnerabilitySecurity Feature BypassImportant
CVE-2025-32709Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-26677Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-27488Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-26685Microsoft Defender for Identity Spoofing VulnerabilitySpoofingImportant
CVE-2025-29829Windows Trusted Runtime Interface Driver Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29830Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29831Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29832Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29835Windows Remote Access Connection Manager Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29836Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29837Windows Installer Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29838Windows ExecutionContext Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29839Windows Multiple UNC Provider Driver Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29840Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29841Universal Print Management Service Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-29842UrlMon Security Feature Bypass VulnerabilitySecurity Feature BypassImportant
CVE-2025-29954Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29955Windows Hyper-V Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29956Windows SMB Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29957Windows Deployment Services Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2025-29958Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29961Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-29962Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29963Windows Media Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-29974Windows Kernel Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2025-30385Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-30388Windows Graphics Component Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-30397Scripting Engine Memory Corruption VulnerabilityRemote Code ExecutionImportant
CVE-2025-32702Visual Studio Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-32704Microsoft Excel Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-32705Microsoft Outlook Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2025-32707NTFS Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2025-24063Kernel Streaming Service Driver Elevation of Privilege VulnerabilityElevation of PrivilegeImportant

Microsoft strongly recommends that users and IT administrators apply these updates immediately through Windows Update or enterprise management tools. Given the presence of an actively exploited zero-day, delaying could leave systems vulnerable to ongoing attacks.

As cyber threats grow in sophistication, the May 2025 Patch Tuesday update reinforces the necessity of proactive security measures. Patch your systems promptly to safeguard against these vulnerabilities and maintain a strong defense against potential exploits.

Other Notable Security Updates

  • Fortinet released security updates for various products, including an actively exploited zero-day vulnerability.
  • SAP releases security updates for multiple products, including a critical 0-day RCE flaw.
  • Apple released security updates for iOS, iPadOS, and macOS.
  • Ivanti released patches for ITSM, Cloud Security & Neurons
  • Zoom Workplace Apps Vulnerabilities Patched, including Privilege Escalation Flaws
  • VMware Aria XSS Vulnerability & VMware Tools Vulnerability patched

The post Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day appeared first on Cyber Security News.