Last updated at Wed, 14 May 2025 05:03:05 GMT

Microsoft is addressing 77 vulnerabilities this May 2025 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation for five of the vulnerabilities published today, and these are already reflected in CISA KEV. Separately, Microsoft is aware of existing public disclosure for two vulnerabilities published today. This is now the eighth consecutive Patch Tuesday on which Microsoft has published zero-day vulnerabilities without evaluating any of them as critical severity at time of publication. Today also sees the publication of six critical remote code execution (RCE) vulnerabilities. Six browser vulnerabilities have already been published separately this month, and are not included in the total.

Windows Scripting Engine: zero-day RCE

In the majority of cases, the CVSSv3 base score provides a solid sense of the severity of a vulnerability. Sometimes, however, even a correct CVSS assessment can disguise the potential impact of a specific vulnerability. This arguably the case with CVE-2025-30397, a zero-day RCE vulnerability in the Windows Scripting Engine with a healthy but unremarkable CVSSv3 base score of 7.5. Microsoft is aware of exploitation in the wild. It’s certainly not the worst of the worst — we save that level of alarm for pre-authentication RCE with no requirement for user interaction —  and Microsoft assesses attack complexity as high, which is arguably correct. And yet…

The advisory FAQ for CVE-2025-30397 explains that successful exploitation requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode, and then causes the user to click a malicious link; there is no mention of a requirement for the user to actively reload the page in Internet Explorer Mode, so we must assume that exploitation requires only that the “Allow sites to be reloaded in Internet Explorer” option is enabled. Users who are most likely to require Internet Explorer compatibility mode in 2025 are surely users at enterprise organizations, where critical business workflows still depend on applications from the dinosaur days when Internet Explorer ruled the roost. No doubt the concept of a plan for migration of all of these applications exists, buried several layers deep in a dusty backlog, but Microsoft would hardly be offering IE compatibility mode until at least 2029 if it didn’t know that a huge swathe of its customer base demands it.

If the pre-requisite conditions are already conveniently in place on the target asset thanks to a well-meaning corporate IT policy, attack complexity is suddenly nice and low. If this vulnerability didn’t have that requirement for environment preparation, the CVSS base score would then be 8.8, which is as close to critical as you can get without actually stepping over the line. As Rapid7 has previously noted on a number of occasions, the MSHTML/Trident scripting engine is still present in Windows; this is true even for assets which have only ever run versions of Windows released well after the end of support for Internet Explorer 11 back in June 2022.

Common Log File System: zero-day EoPs

Neither CVE-2025-32701 nor CVE-2025-32706 are the first zero-day vulnerabilities in the Windows Common Log File Driver System; indeed, they are the latest members of an ongoing dynasty where exploitation typically leads to elevation of privilege to SYSTEM. Credit where credit is due: recent disclosures by Microsoft’s own Threat Intelligence Center (MSTIC), including this month’s CVE-2025-32701, demonstrate that Microsoft is putting serious effort into detecting and rooting out CLFS exploitation. Of course, since Microsoft is aware of exploitation in the wild, we know that someone else got there first, and there’s no reason to suspect that threat actors will stop looking for ways to abuse CLFS any time soon.

Windows Desktop Window Manager: zero-day EoP

If proof were needed that elevation of privilege to SYSTEM will never go out of style, today sees the publication of CVE-2025-30400, which is a zero-day vulnerability in the Windows Desktop Window Manager (DWM). As it happens, tomorrow marks the one-year anniversary of CVE-2024-30051, a previous zero-day EoP vulnerability in DWM.

Visual Studio: zero-day RCE

Today, all current versions of Visual Studio 2022 and 2019 receive patches for CVE-2025-32702, a zero-day RCE where exploitation requires the user to download and open a malicious file. There is nothing obviously remarkable about this, although Microsoft is aware of public disclosure. As usual for a malicious file/link vuln, the word Remote here refers to the location of the attacker, even though exploitation is set in motion by local user action.

Ancillary Function Driver for Winsock: zero-day EoP

Regular Patch Tuesday watchers will recognize the Ancillary Function Driver for Winsock, which is the site of CVE-2025-32709, an elevation of privilege vulnerability for which Microsoft is aware of exploitation. In something of a break with tradition for Patch Tuesday zero-day EoP vulnerabilities, exploitation only leads to administrator privileges rather than all the way to SYSTEM, but no attacker is going to waste too many cycles feeling sad about that.

Defender for Identity: situationally-ironic zero-day spoofing

Today sees the publication of CVE-2025-26685, a zero-day spoofing vulnerability in Microsoft Defender for Identity. The advisory provides puzzle pieces which don’t by themselves add up to anything like a full explanation of the vulnerability; no action is required for remediation, but you can render yourself vulnerable if you insist by opening a case with Microsoft Support to re-enable the legacy NTLM authentication method.

However, the FAQ does offer a link to an article published yesterday: Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity. This solid piece of documentation is part of the overall Defender for Identity administration guide, and explains that the lateral movement path detection feature can itself potentially be exploited by an adversary to obtain an NTLM hash.

Exploitation relies on achieving fallback from Kerberos to NTLM; the compromised credentials in this case would be those of the Directory Service Account for Defender for Identity. The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods; at time of writing, the Defender for Identity What’s new? page doesn’t yet describe the 3.x release, but this will presumably receive an update soon.

Microsoft lifecycle update

The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.

Summary charts

A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday May 2025
A bar chart showing the distribution of vulnerabilities by impact for Microsoft Patch Tuesday May 2025
A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday May 2025

Summary tables

Apps vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29975 Microsoft PC Manager Elevation of Privilege Vulnerability No No 7.8

Azure vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29972 Azure Storage Resource Provider Spoofing Vulnerability No No 9.9
CVE-2025-29827 Azure Automation Elevation of Privilege Vulnerability No No 9.9
CVE-2025-30387 Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability No No 9.8
CVE-2025-47733 Microsoft Power Apps Information Disclosure Vulnerability No No 9.1
CVE-2025-33072 Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability No No 8.1
CVE-2025-29973 Microsoft Azure File Sync Elevation of Privilege Vulnerability No No 7

Azure Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-27488 Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability No No 6.7

Browser vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29825 Microsoft Edge (Chromium-based) Spoofing Vulnerability No No 6.5
CVE-2025-4372 Chromium: CVE-2025-4372 Use after free in WebAudio No No N/A
CVE-2025-4096 Chromium: CVE-2025-4096 Heap buffer overflow in HTML No No N/A
CVE-2025-4052 Chromium: CVE-2025-4052 Inappropriate implementation in DevTools No No N/A
CVE-2025-4051 Chromium: CVE-2025-4051 Insufficient data validation in DevTools No No N/A
CVE-2025-4050 Chromium: CVE-2025-4050 Out of bounds memory access in DevTools No No N/A

Developer Tools vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29813 Azure DevOps Server Elevation of Privilege Vulnerability No No 10
CVE-2025-26646 .NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability No No 8
CVE-2025-32702 Visual Studio Remote Code Execution Vulnerability No Yes 7.8
CVE-2025-21264 Visual Studio Code Security Feature Bypass Vulnerability No No 7.1
CVE-2025-32703 Visual Studio Information Disclosure Vulnerability No No 5.5

ESU Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29962 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-29966 Remote Desktop Client Remote Code Execution Vulnerability No No 8.8
CVE-2025-29967 Remote Desktop Client Remote Code Execution Vulnerability No No 8.8
CVE-2025-32701 Windows Common Log File System Driver Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-32706 Windows Common Log File System Driver Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-30385 Windows Common Log File System Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-32707 NTFS Elevation of Privilege Vulnerability No No 7.8
CVE-2025-24063 Kernel Streaming Service Driver Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29831 Windows Remote Desktop Services Remote Code Execution Vulnerability No No 7.5
CVE-2025-30397 Scripting Engine Memory Corruption Vulnerability Yes No 7.5
CVE-2025-29969 MS-EVEN RPC Remote Code Execution Vulnerability No No 7.5
CVE-2025-29833 Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability No No 7.1
CVE-2025-27468 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability No No 7
CVE-2025-29959 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29960 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29830 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29832 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29836 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29958 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29961 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability No No 6.5
CVE-2025-29835 Windows Remote Access Connection Manager Information Disclosure Vulnerability No No 6.5
CVE-2025-29968 Active Directory Certificate Services (AD CS) Denial of Service Vulnerability No No 6.5
CVE-2025-29957 Windows Deployment Services Denial of Service Vulnerability No No 6.2
CVE-2025-30394 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability No No 5.9
CVE-2025-29954 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability No No 5.9
CVE-2025-29974 Windows Kernel Information Disclosure Vulnerability No No 5.7
CVE-2025-29837 Windows Installer Information Disclosure Vulnerability No No 5.5
CVE-2025-29956 Windows SMB Information Disclosure Vulnerability No No 5.4
CVE-2025-29839 Windows Multiple UNC Provider Driver Information Disclosure Vulnerability No No 4

Microsoft Dynamics vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-47732 Microsoft Dataverse Remote Code Execution Vulnerability No No 8.7
CVE-2025-29826 Microsoft Dataverse Elevation of Privilege Vulnerability No No 7.3

Microsoft Office vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-30377 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-30386 Microsoft Office Remote Code Execution Vulnerability No No 8.4
CVE-2025-32704 Microsoft Excel Remote Code Execution Vulnerability No No 8.4
CVE-2025-30382 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7.8
CVE-2025-29976 Microsoft SharePoint Server Elevation of Privilege Vulnerability No No 7.8
CVE-2025-29978 Microsoft PowerPoint Remote Code Execution Vulnerability No No 7.8
CVE-2025-32705 Microsoft Outlook Remote Code Execution Vulnerability No No 7.8
CVE-2025-29977 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-29979 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30375 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30376 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30379 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30381 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30383 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30393 Microsoft Excel Remote Code Execution Vulnerability No No 7.8
CVE-2025-30384 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7.4
CVE-2025-30378 Microsoft SharePoint Server Remote Code Execution Vulnerability No No 7

Microsoft Office ESU Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-30388 Windows Graphics Component Remote Code Execution Vulnerability No No 7.8

System Center vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-26684 Microsoft Defender Elevation of Privilege Vulnerability No No 6.7
CVE-2025-26685 Microsoft Defender for Identity Spoofing Vulnerability No Yes 6.5

Windows vulnerabilities

CVE Title Exploited? Publicly disclosed? CVSSv3 base score
CVE-2025-29964 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-29840 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-29963 Windows Media Remote Code Execution Vulnerability No No 8.8
CVE-2025-30400 Microsoft DWM Core Library Elevation of Privilege Vulnerability Yes No 7.8
CVE-2025-29970 Microsoft Brokering File System Elevation of Privilege Vulnerability No No 7.8
CVE-2025-26677 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability No No 7.5
CVE-2025-29971 Web Threat Defense (WTD.sys) Denial of Service Vulnerability No No 7.5
CVE-2025-29842 UrlMon Security Feature Bypass Vulnerability No No 7.5
CVE-2025-29838 Windows ExecutionContext Driver Elevation of Privilege Vulnerability No No 7.4
CVE-2025-29841 Universal Print Management Service Elevation of Privilege Vulnerability No No 7
CVE-2025-29955 Windows Hyper-V Denial of Service Vulnerability No No 6.2
CVE-2025-29829 Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability No No 5.5