June 2025 Patch Tuesday fixes 67 Vulnerabilities including 2 Zero-Days

June often signals mid-year check-ins — half the year’s gone, and attackers aren’t slowing down. Neither should you. As we welcome the beginning of summer and National Safety Month, there's no better occasion to fortify your defenses. This month’s Patch Tuesday addresses 67 vulnerabilities, including 2 zero-days and 9 critical vulnerabilities,

Let's see what's in store for us this month. Also, register for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.

June 2025 Security Updates Lineup

  • Total CVEs fixed: 67
  • Zero-day vulnerabilities: 2 (1 Actively Exploited)
  • Critical vulnerabilities: 9
  • Republished CVEs: 3 (refer to the MSRC Release Notes)

Fact: This month's zero-day duo spans both Remote Code Execution and Elevation of Privilege, proving attackers aren’t limiting themselves to one tactic. As for volume, Remote Code Execution continues to dominate with 25 CVEs—a full cybersecurity buffet.

Affected Products, Features, and Roles

Security updates have been released for critical Microsoft products, including:

  • Windows Kernel
  • Microsoft Office
  • Windows Shell
  • Microsoft Visual Studio
  • Windows Storage Management Provider

To view the complete list of affected products, features, and roles, please refer to the MSRC Release Notes

Vulnerability Breakdown

Patch Tuesday wouldn’t be complete without a breakdown of the vulnerability types. Here’s how this month’s vulnerabilities are distributed:

  • Remote Code Execution (25): Attackers' all-time favorite — it lets them run malicious code remotely.
  • Elevation of Privilege (14): Attackers love this one — it upgrades their permissions to wreak more havoc.
  • Information Disclosure (17): Quietly leaking data, one byte at a time.
  • Denial of Service (6): Crash and burn, courtesy of targeted overloads.
  • Security Feature Bypass (3): Slipping past defenses like a stealthy cat.
  • Spoofing (2): Faking it until they make it—impersonating legitimate services.

The takeaway? Remote Code Execution (RCE) remains a top priority this month too as they dominate security updates.

Zero-Day Vulnerability Details

  • CVE-2025-33053
  • Vulnerable Component:Microsoft Windows WebDAV
  • Impact: Remode Code Execution
  • CVSS 3.1: 8.8

This actively exploited flaw targets the WebDAV component, a long-standing Microsoft extension for remote file editing. In this case, attackers can craft malicious WebDAV URLs that, when clicked by a user, lead to arbitrary code execution on the system. The entry vector is deceptively simple—just one click. Think of it as “drive-by downloading” with a side of elevated risk. Microsoft acknowledges that the vulnerability has been used in real-world attacks, though details are scant. Discovered by Alexandra Gofman and David Driker from Check Point Research, this one underscores the need for URL handling hygiene and endpoint monitoring.

  • CVE-2025-33073
  • Vulnerable Component: Windows SMB Client
  • Impact: Elevation of Privilege (EoP)
  • CVSS 3.1: 8.8

This publicly disclosed zero-day takes advantage of improper access control within the Windows SMB client. A remote attacker could exploit it using a malicious script that forces the victim machine to initiate an SMB connection to the attacker’s system. Upon successful coercion, the attacker gains SYSTEM privileges—essentially full control. Although a patch is now available, system administrators can also mitigate the flaw by enabling server-side SMB signing via Group Policy. With a multi-researcher discovery team including contributors from CrowdStrike, Synacktiv, SySS GmbH, RedTeam Pentesting GmbH, and Google Project Zero, this vulnerability attracted serious attention before it was patched.

Third-Party Security Updates

Microsoft isn’t alone in the June patching race. Several other vendors have issued critical updates:

  • Adobe: Rolled out fixes for multiple tools including InCopy, InDesign, Acrobat Reader, Substance 3D Sampler and Painter, Experience Manager, and Commerce. Designers and document editors.
  • Cisco: Patched three vulnerabilities in its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP), all with publicly available exploit code. These are ripe targets.
  • Fortinet: Fixed a critical OS Command Injection vulnerability impacting FortiManager, FortiAnalyzer, and FortiAnalyzer-BigData. Attackers could execute system-level commands remotely.
  • Google: Released Android security updates and addressed an actively exploited zero-day in Google Chrome. If you haven’t updated Chrome yet— go!
  • Hewlett Packard Enterprise (HPE): Addressed eight vulnerabilities in StoreOnce—backup your backup strategies.
  • Ivanti: Remediated three hardcoded key flaws in Workspace Control. These could have led to unauthorized access—definitely patch-worthy.
  • Qualcomm: Disclosed three zero-day vulnerabilities affecting the Adreno GPU driver. These are under targeted attack—especially relevant for Android device security.
  • Roundcube: Issued an urgent fix for a critical RCE vulnerability with a public exploit, currently being exploited.
  • SAP: Delivered patches for multiple products, notably a critical missing authorization check in SAP NetWeaver Application Server for ABAP.

To know more about the patches supported by our product to remediate the vulnerabilities, kindly refer to our forum post.

As we hit the halfway mark of the year, it's clear that threat actors aren’t taking a break—and neither should your patching strategy. Staying ahead means staying consistent. Don’t let unpatched vulnerabilities undo months of good work. Make patching a routine, not a reaction. Patch your systems promptly to ensure your hard work remains intact. With Endpoint Central, Patch Manager Plus and Vulnerability Manager Plus, you can streamline the entire patch management process— from testing patches to deploying them— effectively mitigating vulnerabilities. You can also tailor patch tasks according to your enterprise needs.

Register now for our free Patch Tuesday webinar to gain more insights about these Patch Tuesday Updates. Our experts will not only offer in-depth analysis about the updates but also provide best practice to manage Patches in your network. You can also ask our experts all your patch-related questions and get live answers in the webinar.

Unified Endpoint Management and Security Solution