Microsoft May 2025 Patch Tuesday Fixes 5 Exploited Zero-Days, 72 Flaws

Summary:
As part of the May Microsoft Patch Tuesday, Microsoft addressed 72 flaws, including 5 zero-days which are actively being exploited in attacks in the wild. Of the 57 flaws, there were 17 Elevation of Privilege Vulnerabilities, 2 Security Feature Bypass Vulnerabilities, 28 Remote Code Execution Vulnerabilities, 15 Information Disclosure Vulnerabilities, 7 Denial of Service Vulnerabilities, and 2 Spoofing Vulnerabilities. 6 flaws were rated critical in severity and can lead to remote code execution or the disclosure of information over a network.

In addition to Microsoft, several other vendors have released updates in May 2025:

Security Officer Comments:
The 5 actively exploited zero-days are listed below:
  • CVE-2025-30400 - Microsoft DWM Core Library Elevation of Privilege Vulnerability
  • CVE-2025-32701 and CVE-2025-32706 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
  • CVE-2025-32709 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
  • CVE-2025-30397 - Scripting Engine Memory Corruption Vulnerability
While Microsoft has not disclosed details of how these vulnerabilities were leveraged in attacks in the wild, successful exploitation could enable actors to compromise the security of affected Windows systems. The elevation of privilege flaws such as CVE-2025-30400, CVE-2025-32701, CVE-2025-32706, and CVE-2025-32709 enable local attackers to gain SYSTEM-level access by exploiting weaknesses like use-after-free bugs or improper input validation in core Windows components. This level of access gives attackers full control over the system, allowing them to disable security tools, steal sensitive data, or move laterally across networks. CVE-2025-30397 poses a greater risk due to its remote code execution potential through browsers (e.g., Microsoft Edge or Internet Explorer), enabling attackers to run arbitrary code remotely via social engineering.

Suggested Corrections:
Organizations should review the list of vulnerabilities resolved and apply the relevant patches as needed. To access the full list of vulnerabilities addressed, please use the link below:

https://www.bleepingcomputer.com/mi...reports/Microsoft-Patch-Tuesday-May-2025.html

Link(s):
https://www.bleepingcomputer.com/ne...tuesday-fixes-5-exploited-zero-days-72-flaws/