{"id":25894,"date":"2025-07-25T07:09:13","date_gmt":"2025-07-25T15:09:13","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/07\/25\/news-19614\/"},"modified":"2025-07-25T07:09:13","modified_gmt":"2025-07-25T15:09:13","slug":"news-19614","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2025\/07\/25\/news-19614\/","title":{"rendered":"Patch Tuesday, June 2025 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Jun 2025 00:10:53 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released security updates to fix at least 67 vulnerabilities in its <strong>Windows<\/strong> operating systems and software. Redmond warns that one of the flaws is already under active attack, and that software blueprints showing how to exploit a pervasive Windows bug patched this month are now public.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"749\" height=\"527\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The sole zero-day flaw this month is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-33053\" target=\"_blank\" rel=\"noopener\">CVE-2025-33053<\/a>, a remote code execution flaw in the Windows implementation of <strong>WebDAV<\/strong> &#8212; an HTTP extension that lets users remotely manage files and directories on a server. While WebDAV isn&#8217;t enabled by default in Windows, its presence in legacy or specialized systems still makes it a relevant target, said <strong>Seth Hoyt<\/strong>, senior security engineer at <strong>Automox<\/strong>.<\/p>\n<p><strong>Adam Barnett<\/strong>, lead software engineer at <strong>Rapid7<\/strong>, said Microsoft&#8217;s advisory for CVE-2025-33053 does not mention that the Windows implementation of WebDAV is listed as deprecated since November 2023, which in practical terms means that the WebClient service no longer starts by default.<\/p>\n<p>&#8220;The advisory also has attack complexity as low, which means that exploitation does not require preparation of the target environment in any way that is beyond the attacker\u2019s control,&#8221; Barnett said. &#8220;Exploitation relies on the user clicking a malicious link. It\u2019s not clear how an asset would be immediately vulnerable if the service isn\u2019t running, but all versions of Windows receive a patch, including those released since the deprecation of WebClient, like Server 2025 and Windows 11 24H2.&#8221;<span id=\"more-71465\"><\/span><\/p>\n<p>Microsoft warns that an &#8220;elevation of privilege&#8221; vulnerability in the <strong>Windows Server Message Block<\/strong> (SMB) client (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-33073\" target=\"_blank\" rel=\"noopener\">CVE-2025-33073<\/a>) is likely to be exploited, given that proof-of-concept code for this bug is now public. CVE-2025-33073 has a CVSS risk score of 8.8 (out of 10), and exploitation of the flaw leads to the attacker gaining &#8220;SYSTEM&#8221; level control over a vulnerable PC.<\/p>\n<p>&#8220;What makes this especially dangerous is that no further user interaction is required after the initial connection\u2014something attackers can often trigger without the user realizing it,&#8221; said <strong>Alex Vovk<\/strong>, co-founder and CEO of <strong>Action1<\/strong>. &#8220;Given the high privilege level and ease of exploitation, this flaw poses a significant risk to Windows environments. The scope of affected systems is extensive, as SMB is a core Windows protocol used for file and printer sharing and inter-process communication.&#8221;<\/p>\n<p>Beyond these highlights, 10 of the vulnerabilities fixed this month were rated &#8220;critical&#8221; by Microsoft, including eight remote code execution flaws.<\/p>\n<p>Notably absent from this month&#8217;s patch batch is a fix for a newly discovered weakness in <strong>Windows Server 2025<\/strong> that allows attackers to act with the privileges of any user in Active Directory. The bug, dubbed &#8220;<strong>BadSuccessor<\/strong>,&#8221; was <a href=\"https:\/\/github.com\/akamai\/BadSuccessor\" target=\"_blank\" rel=\"noopener\">publicly disclosed<\/a> by researchers at <strong>Akamai<\/strong> on May 21, and several public proof-of-concepts are now available. Tenable&#8217;s Satnam Narang said organizations that have at least one Windows Server 2025 domain controller should review permissions for principals and limit those permissions as much as possible.<\/p>\n<p><strong>Adobe<\/strong> has released updates for <strong>Acrobat Reader<\/strong> and six other products addressing at least 259 vulnerabilities, most of them in an update for <strong>Experience Manager<\/strong>. <strong>Mozilla Firefox<\/strong> and <strong>Google Chrome<\/strong> both recently released security updates that require a restart of the browser to take effect. The latest Chrome update fixes two zero-day exploits in the browser (CVE-2025-5419 and CVE-2025-4664).<\/p>\n<p>For a detailed breakdown on the individual security updates released by Microsoft today, check out the\u00a0<a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20Patch%20Tuesday%20June%202025\/32032\" target=\"_blank\" rel=\"noopener\">Patch Tuesday roundup<\/a> from the <strong>SANS Internet Storm Center<\/strong>. Action 1 has <a href=\"https:\/\/www.action1.com\/patch-tuesday\/patch-tuesday-june-2025\/?vyj\" target=\"_blank\" rel=\"noopener\">a breakdown of patches from Microsoft<\/a> and a raft of other software vendors releasing fixes this month. As always, please back up your system and\/or data before patching, and feel free to drop a note in the comments if you run into any problems applying these updates.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2025\/06\/patch-tuesday-june-2025-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Jun 2025 00:10:53 +0000<\/strong><\/p>\n<p>Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under active attack, and that software blueprints showing how to exploit a pervasive Windows bug patched this month are now public.\u00a0<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[32580,29556,29353,14187,32581,30119,32582,32583,32584,31241,11427,17395,32585,15086,15801,17220,32586,16936,32587,32588],"class_list":["post-25894","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-acrobat-reader","tag-action1","tag-adam-barnett","tag-akamai","tag-alex-vovk","tag-automox","tag-badsuccessor","tag-cve-2025-33053","tag-cve-2025-33073","tag-experience-manager","tag-google-chrome","tag-mozilla-firefox","tag-patch-tuesday-june-2025","tag-rapid7","tag-sans-internet-storm-center","tag-security-tools","tag-seth-hoyt","tag-time-to-patch","tag-webdav","tag-windows-server-message-block"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25894"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25894\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25894"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}