{"id":3417,"date":"2025-06-11T07:47:10","date_gmt":"2025-06-11T07:47:10","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=3417"},"modified":"2025-06-11T07:47:10","modified_gmt":"2025-06-11T07:47:10","slug":"microsoft-fixes-66-bugs-together-with-lively-0-day","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=3417","title":{"rendered":"Microsoft Fixes 66 Bugs, Together with Lively 0-Day"},"content":{"rendered":"
\n<\/p>\n
Microsoft\u2019s June Patch Tuesday replace has landed, bringing safety fixes for 66 vulnerabilities throughout its product line. Among the many patched flaws is one which was already being exploited in real-world assaults<\/a>, making this month\u2019s updates notably vital for each enterprises and particular person customers.<\/p>\n The standout repair addresses CVE-2025-33053<\/a>, a vulnerability within the WebDAV part of Home windows. This flaw might enable attackers to execute code remotely if exploited appropriately. Because it was already being utilized in assaults earlier than immediately\u2019s patch launch, it falls into the \u201czero-day\u201d class.<\/p>\n The WebDAV vulnerability impacts each Home windows 10 and Home windows 11<\/a>, together with associated server variations. Whereas Microsoft has not disclosed the total particulars of the assaults, they’ve confirmed that the bug was present in use within the wild.<\/p>\n Along with the zero-day, Microsoft patched 10 vulnerabilities rated Vital, which usually means they permit distant code execution or elevation of privilege with out a lot consumer interplay. These embody 4 bugs in Microsoft Workplace, which proceed to be a daily goal for attackers trying to ship malicious paperwork by means of e mail.<\/p>\n Different merchandise receiving fixes embody Microsoft Edge, Energy Automate, .NET, and elements of Home windows itself. Whereas not one of the different points have been reported as actively exploited, a number of are marked as extra prone to be focused within the close to time period.<\/p>\n The up to date packages can be found now and embody:<\/p>\n Admins ought to examine their replace administration methods to verify rollout and assess any compatibility issues which will come up from the newest patches.<\/p>\n The fast exploitation of CVE-2025-33053 as soon as once more reveals how briskly attackers transfer when new vulnerabilities are disclosed. Whereas zero days usually make headlines, the opposite fixes shouldn’t be ignored. A number of of this month\u2019s bugs contain elements usually uncovered to the web or ceaselessly utilized in enterprise environments.<\/p>\n Firms that delay patching usually are not simply risking knowledge theft but in addition the price of restoration from ransomware, which regularly begins with bugs like those patched immediately.<\/p>\n Nick Carroll<\/a>, cyber incident response supervisor at\u00a0Nightwing<\/a>, the intelligence options firm divested from RTX, commented on the Patch Tuesday occasion, stating, \u201c<\/em>There are a few vulnerabilities for the Home windows Widespread Log File System (CVE-2025-32701 and CVE-2025-32706) that are Priv Esc vulnerabilities. These aren\u2019t vital, which suggests some organizations received\u2019t prioritize patching them as shortly as they most likely ought to. And for those who have a look at what tends to get quite a lot of consideration, vital vulnerabilities catch all the excitement,\u201d famous Nick.<\/p>\n \u201c<\/em>However we see actual world assaults abusing that Home windows Log File subsystem fairly recurrently. Actually, Nightwing has defended towards exploits within the Home windows Widespread Log File System in actual world assaults final month associated to the not too long ago patched CVE-2025-29824 the place the risk actors have been abusing Dwelling-off-the-Land techniques together with the exploit,\u201d he added.<\/p>\n Microsoft\u2019s full advisory will be discovered on its official safety replace information<\/a>. Patching shortly stays one of many easiest and handiest defences towards many types of cyberattacks.<\/p>\nOne Zero-Day Actively Exploited<\/strong><\/h3>\n
10 Vital Points Fastened<\/strong><\/h3>\n
Home windows Replace Particulars<\/strong><\/h3>\n
\n
\n
\n
Why This Month Issues<\/strong><\/h3>\n
What to Do Now<\/strong><\/h3>\n
\n
\n
\n
\n