Microsoft’s ‘Patch Tuesday’ Update Fixes Seven Zero-Day Exploits ...Middle East

Live Hacker - News
Microsoft’s ‘Patch Tuesday’ Update Fixes Seven Zero-Day Exploits

Microsoft has released its latest monthly Patch Tuesday update, this time offering fixes for 72 security vulnerabilities across its systems. Five of the malicious bugs addressed are zero-days that have been actively exploited, and two have been publicly disclosed.

As Bleeping Computer reports, the May update addresses 17 elevation of privilege flaws, two security feature bypass flaws, 28 remote code execution flaws, 15 information disclosure flaws, seven denial of service flaws, and two spoofing flaws. In addition to the zero-day exploits, six of the remote code execution vulnerabilities are labeled "critical" along with one information disclosure flaw.

    If you're a Windows or Microsoft user, you should ensure your systems are up to date.

    While all of Microsoft's security updates are important to maintain the integrity of your devices and data, this Patch Tuesday is particularly heavy on zero-days—flaws that are actively exploited or publicly disclosed before the developer issues an official fix.

    Four of the five actively exploited zero-days fixed with this update are elevation of privilege flaws. CVE-2025-32701 and CVE-2025-32706 both affect Windows Common Log File System Driver, while CVE-2025-30400 affects Microsoft DWM Core Library, and CVE-2025-32709 Windows Ancillary Function Driver for WinSock. All allow attackers SYSTEM privileges locally.

    The fifth active exploit is a remote code execution vulnerability (labeled CVE-2025-30397) in Microsoft Scripting Engine. The flaw can be exploited if an authenticated user clicks a fraudulent link in Microsoft Edge or Internet Explorer, allowing attackers to execute code over a network.

    CVE-2025-30397, CVE-2025-32701, and CVE-2025-30400 were discovered by the Microsoft Threat Intelligence Center. CVE-2025-32706 was disclosed by the Google Threat Intelligence Group and the CrowdStrike Advanced Research Team, while CVE-2025-32709 came from an "anonymous" researcher. Microsoft has not disclosed how these flaws were exploited.

    One of the publicly disclosed zero-days patched this month is a spoofing flaw in Microsoft Defender (CVE-2025-26685) that allows unauthenticated attackers with LAN access to spoof another account. This was discovered by Joshua Murrell with NetSPI. The final zero-day (CVE-2025-32702) is a remote code execution vulnerability in Visual Studio—Microsoft has not revealed any additional details.

    How to protect your PC

    You should always install security updates as soon as they become available to minimize the risk to your system. Windows and Microsoft patches are usually downloaded and installed automatically, but you can make sure your PC is good to go via Start > Settings > Windows Update and selecting Check for Windows updates.

    Read More Details
    Finally We wish PressBee provided you with enough information of ( Microsoft’s ‘Patch Tuesday’ Update Fixes Seven Zero-Day Exploits )

    Also on site :

    Most viewed in News