Exposure Management

Patch Tuesday - May 2025

|Last updated on May 26, 2025|1 min read
LinkedInFacebookX
Patch Tuesday - May 2025

Microsoft is addressing 77 vulnerabilities this May 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for five of the vulnerabilities published today, and these are already reflected in CISA KEV. Separately, Microsoft is aware of existing public disclosure for two vulnerabilities published today. This is now the eighth consecutive Patch Tuesday on which Microsoft has published zero-day vulnerabilities without evaluating any of them as critical severity at time of publication. Today also sees the publication of six critical remote code execution (RCE) vulnerabilities. Six browser vulnerabilities have already been published separately this month, and are not included in the total.

Windows Scripting Engine: zero-day RCE

In the majority of cases, the CVSSv3 base score provides a solid sense of the severity of a vulnerability. Sometimes, however, even a correct CVSS assessment can disguise the potential impact of a specific vulnerability. This is arguably the case with CVE-2025-30397, a zero-day RCE vulnerability in the Windows Scripting Engine with a healthy but unremarkable CVSSv3 base score of 7.5. Microsoft is aware of exploitation in the wild. It’s certainly not the worst of the worst — we save that level of alarm for pre-authentication RCE with no requirement for user interaction —  and Microsoft very reasonably assesses attack complexity as high. And yet…

The advisory FAQ for CVE-2025-30397 explains that successful exploitation requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode, and then causes the user to click a malicious link; there is no mention of a requirement for the user to actively reload the page in Internet Explorer Mode, so we must assume that exploitation requires only that the “Allow sites to be reloaded in Internet Explorer” option is enabled. Users who are most likely to require Internet Explorer compatibility mode in 2025 are surely users at enterprise organizations, where critical business workflows still depend on applications from the dinosaur days when Internet Explorer ruled the roost. No doubt the concept of a plan for migration of all of these applications exists, buried several layers deep in a dusty backlog, but Microsoft would hardly be offering IE compatibility mode until at least 2029 if it didn’t know that a huge swathe of its customer base demands it.

If the pre-requisite conditions are already conveniently in place on the target asset thanks to a well-meaning corporate IT policy, attack complexity is suddenly nice and low. If this vulnerability didn’t have that requirement for environment preparation, the CVSS base score would then be 8.8, which is as close to critical as you can get without actually stepping over the line. As Rapid7 has previously noted on a number of occasions, the MSHTML/Trident scripting engine is still present in Windows; this is true even for assets which have only ever run versions of Windows released well after the end of support for Internet Explorer 11 back in June 2022.

Common Log File System: zero-day EoPs

CVE-2025-32701 and CVE-2025-32706 are far from the first zero-day vulnerabilities in the Windows Common Log File System (CLFS) driver; indeed, they are the latest members of an ongoing dynasty where exploitation typically leads to elevation of privilege to SYSTEM. Credit where credit is due: recent disclosures by Microsoft’s own Threat Intelligence Center (MSTIC), including this month’s CVE-2025-32701, demonstrate that Microsoft is putting serious effort into detecting and rooting out CLFS exploitation. Of course, since Microsoft is aware of exploitation in the wild, we know that someone else got there first, and there’s no reason to suspect that threat actors will stop looking for ways to abuse CLFS any time soon.

Windows Desktop Window Manager: zero-day EoP

If proof were needed that elevation of privilege to SYSTEM will never go out of style, today sees the publication of CVE-2025-30400, which is a zero-day vulnerability in the Windows Desktop Window Manager (DWM). As it happens, tomorrow marks the one-year anniversary of CVE-2024-30051, a previous zero-day EoP vulnerability in DWM.

Visual Studio: zero-day RCE

Today, all current versions of Visual Studio 2022 and 2019 receive patches for CVE-2025-32702, a zero-day RCE where exploitation requires the user to download and open a malicious file. There is nothing obviously remarkable about this, although Microsoft is aware of public disclosure. As usual for a malicious file/link vuln, the word Remote here refers to the location of the attacker, even though exploitation is set in motion by local user action.

Ancillary Function Driver for Winsock: zero-day EoP

Regular Patch Tuesday watchers will recognize the Ancillary Function Driver for Winsock, which is the site of CVE-2025-32709, an elevation of privilege vulnerability for which Microsoft is aware of exploitation. In something of a break with tradition for Patch Tuesday zero-day EoP vulnerabilities, exploitation only leads to administrator privileges rather than all the way to SYSTEM, but no attacker is going to waste too many cycles feeling sad about that.

Defender for Identity: situationally-ironic zero-day spoofing

Today sees the publication of CVE-2025-26685, a zero-day spoofing vulnerability in Microsoft Defender for Identity. The advisory provides puzzle pieces which don’t by themselves add up to anything like a full explanation of the vulnerability; no action is required for remediation, but you can render yourself vulnerable if you insist by opening a case with Microsoft Support to re-enable the legacy NTLM authentication method.

However, the FAQ does offer a link to an article published yesterday: Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity. This solid piece of documentation is part of the overall Defender for Identity administration guide, and explains that the lateral movement path detection feature can itself potentially be exploited by an adversary to obtain an NTLM hash.

Exploitation relies on achieving fallback from Kerberos to NTLM; the compromised credentials in this case would be those of the Directory Service Account for Defender for Identity. The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods; at time of writing, the Defender for Identity What’s new? page doesn’t yet describe the 3.x release, but this will presumably receive an update soon.

Microsoft lifecycle update

The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.

Summary charts

A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday May 2025A bar chart showing the distribution of vulnerabilities by impact for Microsoft Patch Tuesday May 2025A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday May 2025

Summary tables

Apps vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-29975Microsoft PC Manager Elevation of Privilege VulnerabilityNoNo7.8

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-29972Azure Storage Resource Provider Spoofing VulnerabilityNoNo9.9
CVE-2025-29827Azure Automation Elevation of Privilege VulnerabilityNoNo9.9
CVE-2025-30387Document Intelligence Studio On-Prem Elevation of Privilege VulnerabilityNoNo9.8
CVE-2025-47733Microsoft Power Apps Information Disclosure VulnerabilityNoNo9.1
CVE-2025-33072Microsoft msagsfeedback.azurewebsites.net Information Disclosure VulnerabilityNoNo8.1
CVE-2025-29973Microsoft Azure File Sync Elevation of Privilege VulnerabilityNoNo7

Azure Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-27488Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege VulnerabilityNoNo6.7

Browser vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-29825Microsoft Edge (Chromium-based) Spoofing VulnerabilityNoNo6.5
CVE-2025-4372Chromium: CVE-2025-4372 Use after free in WebAudioNoNoN/A
CVE-2025-4096Chromium: CVE-2025-4096 Heap buffer overflow in HTMLNoNoN/A
CVE-2025-4052Chromium: CVE-2025-4052 Inappropriate implementation in DevToolsNoNoN/A
CVE-2025-4051Chromium: CVE-2025-4051 Insufficient data validation in DevToolsNoNoN/A
CVE-2025-4050Chromium: CVE-2025-4050 Out of bounds memory access in DevToolsNoNoN/A

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-29813Azure DevOps Server Elevation of Privilege VulnerabilityNoNo10
CVE-2025-26646.NET, Visual Studio, and Build Tools for Visual Studio Spoofing VulnerabilityNoNo8
CVE-2025-32702Visual Studio Remote Code Execution VulnerabilityNoYes7.8
CVE-2025-21264Visual Studio Code Security Feature Bypass VulnerabilityNoNo7.1
CVE-2025-32703Visual Studio Information Disclosure VulnerabilityNoNo5.5

ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-29962Windows Media Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-29966Remote Desktop Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-29967Remote Desktop Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-32701Windows Common Log File System Driver Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-32706Windows Common Log File System Driver Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-30385Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-32709Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-32707NTFS Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-24063Kernel Streaming Service Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-29831Windows Remote Desktop Services Remote Code Execution VulnerabilityNoNo7.5
CVE-2025-30397Scripting Engine Memory Corruption VulnerabilityYesNo7.5
CVE-2025-29969MS-EVEN RPC Remote Code Execution VulnerabilityNoNo7.5
CVE-2025-29833Microsoft Virtual Machine Bus (VMBus) Remote Code Execution VulnerabilityNoNo7.1
CVE-2025-27468Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityNoNo7
CVE-2025-29959Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29960Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29830Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29832Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29836Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29958Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29961Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29835Windows Remote Access Connection Manager Information Disclosure VulnerabilityNoNo6.5
CVE-2025-29968Active Directory Certificate Services (AD CS) Denial of Service VulnerabilityNoNo6.5
CVE-2025-29957Windows Deployment Services Denial of Service VulnerabilityNoNo6.2
CVE-2025-30394Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityNoNo5.9
CVE-2025-29954Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityNoNo5.9
CVE-2025-29974Windows Kernel Information Disclosure VulnerabilityNoNo5.7
CVE-2025-29837Windows Installer Information Disclosure VulnerabilityNoNo5.5
CVE-2025-29956Windows SMB Information Disclosure VulnerabilityNoNo5.4
CVE-2025-29839Windows Multiple UNC Provider Driver Information Disclosure VulnerabilityNoNo4

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-47732Microsoft Dataverse Remote Code Execution VulnerabilityNoNo8.7
CVE-2025-29826Microsoft Dataverse Elevation of Privilege VulnerabilityNoNo7.3

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-30377Microsoft Office Remote Code Execution VulnerabilityNoNo8.4
CVE-2025-30386Microsoft Office Remote Code Execution VulnerabilityNoNo8.4
CVE-2025-32704Microsoft Excel Remote Code Execution VulnerabilityNoNo8.4
CVE-2025-30382Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-29976Microsoft SharePoint Server Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-29978Microsoft PowerPoint Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-32705Microsoft Outlook Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-29977Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-29979Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30375Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30376Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30379Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30381Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30383Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30393Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2025-30384Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo7.4
CVE-2025-30378Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo7

Microsoft Office ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-30388Windows Graphics Component Remote Code Execution VulnerabilityNoNo7.8

System Center vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-26684Microsoft Defender Elevation of Privilege VulnerabilityNoNo6.7
CVE-2025-26685Microsoft Defender for Identity Spoofing VulnerabilityNoYes6.5

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2025-29964Windows Media Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-29840Windows Media Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-29963Windows Media Remote Code Execution VulnerabilityNoNo8.8
CVE-2025-30400Microsoft DWM Core Library Elevation of Privilege VulnerabilityYesNo7.8
CVE-2025-29970Microsoft Brokering File System Elevation of Privilege VulnerabilityNoNo7.8
CVE-2025-26677Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityNoNo7.5
CVE-2025-29971Web Threat Defense (WTD.sys) Denial of Service VulnerabilityNoNo7.5
CVE-2025-29842UrlMon Security Feature Bypass VulnerabilityNoNo7.5
CVE-2025-29838Windows ExecutionContext Driver Elevation of Privilege VulnerabilityNoNo7.4
CVE-2025-29841Universal Print Management Service Elevation of Privilege VulnerabilityNoNo7
CVE-2025-29955Windows Hyper-V Denial of Service VulnerabilityNoNo6.2
CVE-2025-29829Windows Trusted Runtime Interface Driver Information Disclosure VulnerabilityNoNo5.5

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now

Related blog posts