Last updated at Wed, 14 May 2025 05:03:05 GMT
Microsoft is addressing 77 vulnerabilities this May 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for five of the vulnerabilities published today, and these are already reflected in CISA KEV. Separately, Microsoft is aware of existing public disclosure for two vulnerabilities published today. This is now the eighth consecutive Patch Tuesday on which Microsoft has published zero-day vulnerabilities without evaluating any of them as critical severity at time of publication. Today also sees the publication of six critical remote code execution (RCE) vulnerabilities. Six browser vulnerabilities have already been published separately this month, and are not included in the total.
Windows Scripting Engine: zero-day RCE
In the majority of cases, the CVSSv3 base score provides a solid sense of the severity of a vulnerability. Sometimes, however, even a correct CVSS assessment can disguise the potential impact of a specific vulnerability. This arguably the case with CVE-2025-30397, a zero-day RCE vulnerability in the Windows Scripting Engine with a healthy but unremarkable CVSSv3 base score of 7.5. Microsoft is aware of exploitation in the wild. It’s certainly not the worst of the worst — we save that level of alarm for pre-authentication RCE with no requirement for user interaction — and Microsoft assesses attack complexity as high, which is arguably correct. And yet…
The advisory FAQ for CVE-2025-30397 explains that successful exploitation requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode, and then causes the user to click a malicious link; there is no mention of a requirement for the user to actively reload the page in Internet Explorer Mode, so we must assume that exploitation requires only that the “Allow sites to be reloaded in Internet Explorer” option is enabled. Users who are most likely to require Internet Explorer compatibility mode in 2025 are surely users at enterprise organizations, where critical business workflows still depend on applications from the dinosaur days when Internet Explorer ruled the roost. No doubt the concept of a plan for migration of all of these applications exists, buried several layers deep in a dusty backlog, but Microsoft would hardly be offering IE compatibility mode until at least 2029 if it didn’t know that a huge swathe of its customer base demands it.
If the pre-requisite conditions are already conveniently in place on the target asset thanks to a well-meaning corporate IT policy, attack complexity is suddenly nice and low. If this vulnerability didn’t have that requirement for environment preparation, the CVSS base score would then be 8.8, which is as close to critical as you can get without actually stepping over the line. As Rapid7 has previously noted on a number of occasions, the MSHTML/Trident scripting engine is still present in Windows; this is true even for assets which have only ever run versions of Windows released well after the end of support for Internet Explorer 11 back in June 2022.
Common Log File System: zero-day EoPs
Neither CVE-2025-32701 nor CVE-2025-32706 are the first zero-day vulnerabilities in the Windows Common Log File Driver System; indeed, they are the latest members of an ongoing dynasty where exploitation typically leads to elevation of privilege to SYSTEM. Credit where credit is due: recent disclosures by Microsoft’s own Threat Intelligence Center (MSTIC), including this month’s CVE-2025-32701, demonstrate that Microsoft is putting serious effort into detecting and rooting out CLFS exploitation. Of course, since Microsoft is aware of exploitation in the wild, we know that someone else got there first, and there’s no reason to suspect that threat actors will stop looking for ways to abuse CLFS any time soon.
Windows Desktop Window Manager: zero-day EoP
If proof were needed that elevation of privilege to SYSTEM will never go out of style, today sees the publication of CVE-2025-30400, which is a zero-day vulnerability in the Windows Desktop Window Manager (DWM). As it happens, tomorrow marks the one-year anniversary of CVE-2024-30051, a previous zero-day EoP vulnerability in DWM.
Visual Studio: zero-day RCE
Today, all current versions of Visual Studio 2022 and 2019 receive patches for CVE-2025-32702, a zero-day RCE where exploitation requires the user to download and open a malicious file. There is nothing obviously remarkable about this, although Microsoft is aware of public disclosure. As usual for a malicious file/link vuln, the word Remote here refers to the location of the attacker, even though exploitation is set in motion by local user action.
Ancillary Function Driver for Winsock: zero-day EoP
Regular Patch Tuesday watchers will recognize the Ancillary Function Driver for Winsock, which is the site of CVE-2025-32709, an elevation of privilege vulnerability for which Microsoft is aware of exploitation. In something of a break with tradition for Patch Tuesday zero-day EoP vulnerabilities, exploitation only leads to administrator privileges rather than all the way to SYSTEM, but no attacker is going to waste too many cycles feeling sad about that.
Defender for Identity: situationally-ironic zero-day spoofing
Today sees the publication of CVE-2025-26685, a zero-day spoofing vulnerability in Microsoft Defender for Identity. The advisory provides puzzle pieces which don’t by themselves add up to anything like a full explanation of the vulnerability; no action is required for remediation, but you can render yourself vulnerable if you insist by opening a case with Microsoft Support to re-enable the legacy NTLM authentication method.
However, the FAQ does offer a link to an article published yesterday: Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity. This solid piece of documentation is part of the overall Defender for Identity administration guide, and explains that the lateral movement path detection feature can itself potentially be exploited by an adversary to obtain an NTLM hash.
Exploitation relies on achieving fallback from Kerberos to NTLM; the compromised credentials in this case would be those of the Directory Service Account for Defender for Identity. The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods; at time of writing, the Defender for Identity What’s new? page doesn’t yet describe the 3.x release, but this will presumably receive an update soon.
Microsoft lifecycle update
The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.
Summary charts



Summary tables
Apps vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-29975 | Microsoft PC Manager Elevation of Privilege Vulnerability | No | No | 7.8 |
Azure vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-29972 | Azure Storage Resource Provider Spoofing Vulnerability | No | No | 9.9 |
CVE-2025-29827 | Azure Automation Elevation of Privilege Vulnerability | No | No | 9.9 |
CVE-2025-30387 | Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability | No | No | 9.8 |
CVE-2025-47733 | Microsoft Power Apps Information Disclosure Vulnerability | No | No | 9.1 |
CVE-2025-33072 | Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability | No | No | 8.1 |
CVE-2025-29973 | Microsoft Azure File Sync Elevation of Privilege Vulnerability | No | No | 7 |
Azure Windows vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-27488 | Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability | No | No | 6.7 |
Browser vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-29825 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | No | No | 6.5 |
CVE-2025-4372 | Chromium: CVE-2025-4372 Use after free in WebAudio | No | No | N/A |
CVE-2025-4096 | Chromium: CVE-2025-4096 Heap buffer overflow in HTML | No | No | N/A |
CVE-2025-4052 | Chromium: CVE-2025-4052 Inappropriate implementation in DevTools | No | No | N/A |
CVE-2025-4051 | Chromium: CVE-2025-4051 Insufficient data validation in DevTools | No | No | N/A |
CVE-2025-4050 | Chromium: CVE-2025-4050 Out of bounds memory access in DevTools | No | No | N/A |
Developer Tools vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-29813 | Azure DevOps Server Elevation of Privilege Vulnerability | No | No | 10 |
CVE-2025-26646 | .NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability | No | No | 8 |
CVE-2025-32702 | Visual Studio Remote Code Execution Vulnerability | No | Yes | 7.8 |
CVE-2025-21264 | Visual Studio Code Security Feature Bypass Vulnerability | No | No | 7.1 |
CVE-2025-32703 | Visual Studio Information Disclosure Vulnerability | No | No | 5.5 |
ESU Windows vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-29962 | Windows Media Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2025-29966 | Remote Desktop Client Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2025-29967 | Remote Desktop Client Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2025-32701 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Yes | No | 7.8 |
CVE-2025-32706 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Yes | No | 7.8 |
CVE-2025-30385 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2025-32709 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Yes | No | 7.8 |
CVE-2025-32707 | NTFS Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2025-24063 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2025-29831 | Windows Remote Desktop Services Remote Code Execution Vulnerability | No | No | 7.5 |
CVE-2025-30397 | Scripting Engine Memory Corruption Vulnerability | Yes | No | 7.5 |
CVE-2025-29969 | MS-EVEN RPC Remote Code Execution Vulnerability | No | No | 7.5 |
CVE-2025-29833 | Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability | No | No | 7.1 |
CVE-2025-27468 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | No | No | 7 |
CVE-2025-29959 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29960 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29830 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29832 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29836 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29958 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29961 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29835 | Windows Remote Access Connection Manager Information Disclosure Vulnerability | No | No | 6.5 |
CVE-2025-29968 | Active Directory Certificate Services (AD CS) Denial of Service Vulnerability | No | No | 6.5 |
CVE-2025-29957 | Windows Deployment Services Denial of Service Vulnerability | No | No | 6.2 |
CVE-2025-30394 | Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability | No | No | 5.9 |
CVE-2025-29954 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | No | No | 5.9 |
CVE-2025-29974 | Windows Kernel Information Disclosure Vulnerability | No | No | 5.7 |
CVE-2025-29837 | Windows Installer Information Disclosure Vulnerability | No | No | 5.5 |
CVE-2025-29956 | Windows SMB Information Disclosure Vulnerability | No | No | 5.4 |
CVE-2025-29839 | Windows Multiple UNC Provider Driver Information Disclosure Vulnerability | No | No | 4 |
Microsoft Dynamics vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-47732 | Microsoft Dataverse Remote Code Execution Vulnerability | No | No | 8.7 |
CVE-2025-29826 | Microsoft Dataverse Elevation of Privilege Vulnerability | No | No | 7.3 |
Microsoft Office vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-30377 | Microsoft Office Remote Code Execution Vulnerability | No | No | 8.4 |
CVE-2025-30386 | Microsoft Office Remote Code Execution Vulnerability | No | No | 8.4 |
CVE-2025-32704 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 8.4 |
CVE-2025-30382 | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-29976 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2025-29978 | Microsoft PowerPoint Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-32705 | Microsoft Outlook Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-29977 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-29979 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30375 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30376 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30379 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30381 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30383 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30393 | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 |
CVE-2025-30384 | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 7.4 |
CVE-2025-30378 | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 7 |
Microsoft Office ESU Windows vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-30388 | Windows Graphics Component Remote Code Execution Vulnerability | No | No | 7.8 |
System Center vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-26684 | Microsoft Defender Elevation of Privilege Vulnerability | No | No | 6.7 |
CVE-2025-26685 | Microsoft Defender for Identity Spoofing Vulnerability | No | Yes | 6.5 |
Windows vulnerabilities
CVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score |
---|---|---|---|---|
CVE-2025-29964 | Windows Media Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2025-29840 | Windows Media Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2025-29963 | Windows Media Remote Code Execution Vulnerability | No | No | 8.8 |
CVE-2025-30400 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Yes | No | 7.8 |
CVE-2025-29970 | Microsoft Brokering File System Elevation of Privilege Vulnerability | No | No | 7.8 |
CVE-2025-26677 | Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability | No | No | 7.5 |
CVE-2025-29971 | Web Threat Defense (WTD.sys) Denial of Service Vulnerability | No | No | 7.5 |
CVE-2025-29842 | UrlMon Security Feature Bypass Vulnerability | No | No | 7.5 |
CVE-2025-29838 | Windows ExecutionContext Driver Elevation of Privilege Vulnerability | No | No | 7.4 |
CVE-2025-29841 | Universal Print Management Service Elevation of Privilege Vulnerability | No | No | 7 |
CVE-2025-29955 | Windows Hyper-V Denial of Service Vulnerability | No | No | 6.2 |
CVE-2025-29829 | Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability | No | No | 5.5 |