Microsoft Releases June 2025 Patch Tuesday Updates

Microsoft patches 66 vulnerabilities in June update, including critical RCE flaws and a zero-day exploit.

Windows update hero image

Key Takeaways:

  • Microsoft’s June 2025 Patch Tuesday fixes 66 vulnerabilities—10 rated Critical—including one actively exploited remote code execution flaw.
  • The latest updates resolve major issues in Windows Hello for Business and Hyper-V virtual machines across Windows 10, 11, and Windows Server systems.
  • Critical flaws in WebDAV, SMB, SharePoint, and Remote Desktop Services highlight the urgency of installing this month’s updates.

Microsoft has released the June 2025 Patch Tuesday updates for Windows 11 and Windows 10 PCs. On the security front, the company has addressed over 60 vulnerabilities in Windows and Windows Components, Office, and other components.

On the quality and experiences update front, Microsoft has fixed an issue that was previously preventing users from signing in with self-signed certificates when using Windows Hello for Business with the Key Trust model on Windows 11 PCs.​​​​​​​ The company has also addressed an issue with Hyper-V virtual machines on Windows 10, Windows 11, and Windows Server.

66 vulnerabilities fixed with the June 2025 Patch Tuesday updates

As pointed out by the Zero Day Initiative, Microsoft has fixed 66 new vulnerabilities this month, including 10 Critical ones. However, one of them is currently being exploited by attackers. Let’s take a look at the most important vulnerabilities Microsoft fixed this month:

  • CVE-2025-33053: This is a remote code execution (RCE) vulnerability in the Web Distributed Authoring and Versioning (WebDAV) protocol with a CVSS score of 8.8. An attacker could exploit this flaw by tricking a targeted victim into clicking on a malicious URL or visiting a compromised website.
  • CVE-2025-33073: This is a Windows Server Message Block (SMB) client vulnerability that could allow the attacker to gain system-level privileges. This bug could be exploited by tricking the user into signing onto a malicious server.
  • CVE-2025-47172: This is a critical remote code execution flaw in Microsoft SharePoint with a CVSS score of 8.8. A successful exploitation allows an authenticated attacker to execute malicious code over the network.
  • CVE-2025-29828: This is a memory leak issue in Windows Schannel, with a CVSS score of 8.1. Windows Schannel (Secure Channel) is a security support provider (SSP) that comes built into Microsoft Windows.
  • CVE-2025-32710: This is a remote code execution flaw in Windows Remote Desktop Services, which could allow unauthorized access to the target machine.
  • CVE-2025-33070: This is an elevation of privilege vulnerability in Windows Netlogon that would require a “complex” attack to exploit.

You can find below the full list of security patches Microsoft released this month:

ProductImpactMax SeverityArticleDownloadDetails
Microsoft 365 Apps for Enterprise for 64-bit SystemsRemote Code ExecutionCriticalClick to RunSecurity UpdateCVE-2025-32717
Microsoft 365 Apps for Enterprise for 32-bit SystemsRemote Code ExecutionCriticalClick to RunSecurity UpdateCVE-2025-32717
Microsoft Office LTSC for Mac 2021Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2025-47173
Microsoft Office 2019 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2025-47173
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5061078Monthly RollupCVE-2025-33073
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5061036Security OnlyCVE-2025-33073
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5061078Monthly RollupCVE-2025-33073
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5061036Security OnlyCVE-2025-33073
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5061026Monthly RollupCVE-2025-33073
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5061072Security OnlyCVE-2025-33073
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5061026Monthly RollupCVE-2025-33073
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5061072Security OnlyCVE-2025-33073
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5061026Monthly RollupCVE-2025-33073
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5061072Security OnlyCVE-2025-33073
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5061026Monthly RollupCVE-2025-33073
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5061072Security OnlyCVE-2025-33073
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportant5061010Security UpdateCVE-2025-33073
Windows Server 2016Elevation of PrivilegeImportant5061010Security UpdateCVE-2025-33073
Windows 10 Version 1607 for x64-based SystemsElevation of PrivilegeImportant5061010Security UpdateCVE-2025-33073
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportant5061010Security UpdateCVE-2025-33073
Windows 11 Version 23H2 for x64-based SystemsDenial of ServiceImportant5060999Security UpdateCVE-2025-33057
Windows 11 Version 23H2 for ARM64-based SystemsDenial of ServiceImportant5060999Security UpdateCVE-2025-33057
Windows Server 2025 (Server Core installation)Denial of ServiceImportant5060842Security UpdateCVE-2025-33057
Windows Server 2025 (Server Core installation)Denial of ServiceImportant5060841SecurityHotpatchUpdateCVE-2025-33057
Windows 10 Version 22H2 for 32-bit SystemsDenial of ServiceImportant5060533Security UpdateCVE-2025-33057
Windows 10 Version 22H2 for ARM64-based SystemsDenial of ServiceImportant5060533Security UpdateCVE-2025-33057
Windows 10 Version 22H2 for x64-based SystemsDenial of ServiceImportant5060533Security UpdateCVE-2025-33057
Windows 11 Version 22H2 for x64-based SystemsDenial of ServiceImportant5060999Security UpdateCVE-2025-33057
Windows 11 Version 22H2 for ARM64-based SystemsDenial of ServiceImportant5060999Security UpdateCVE-2025-33057
Windows 10 Version 21H2 for x64-based SystemsDenial of ServiceImportant5060533Security UpdateCVE-2025-33057
Windows 10 Version 21H2 for ARM64-based SystemsDenial of ServiceImportant5060533Security UpdateCVE-2025-33057
Windows Server 2022, 23H2 Edition (Server Core installation)Remote Code ExecutionImportant5060118Security UpdateCVE-2025-33053
Windows 11 Version 23H2 for x64-based SystemsElevation of PrivilegeImportant5058405Security UpdateCVE-2025-47955
Windows 11 Version 23H2 for ARM64-based SystemsElevation of PrivilegeImportant5058405Security UpdateCVE-2025-47955
Windows Server 2025 (Server Core installation)Elevation of PrivilegeImportant5058411Security UpdateCVE-2025-47955
Windows Server 2025 (Server Core installation)Elevation of PrivilegeImportant5058497SecurityHotpatchUpdateCVE-2025-47955
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportant5058379Security UpdateCVE-2025-47955
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5058379Security UpdateCVE-2025-47955
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5058379Security UpdateCVE-2025-47955
Windows 11 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5058405Security UpdateCVE-2025-47955
Windows 11 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5058405Security UpdateCVE-2025-47955
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5060533Security UpdateCVE-2025-33075
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5060526Security UpdateCVE-2025-33075
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5060525SecurityHotpatchUpdateCVE-2025-33075
Windows Server 2022Elevation of PrivilegeImportant5060526Security UpdateCVE-2025-33075
Windows Server 2022Elevation of PrivilegeImportant5060525SecurityHotpatchUpdateCVE-2025-33075
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5060531Security UpdateCVE-2025-33075
Windows Server 2019Elevation of PrivilegeImportant5060531Security UpdateCVE-2025-33075
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5060531Security UpdateCVE-2025-33075
Windows 10 Version 1809 for 32-bit SystemsInformation DisclosureImportant5060531Security UpdateCVE-2025-33065
Windows Server 2012 R2 (Server Core installation)Remote Code ExecutionImportant5061018Monthly RollupCVE-2025-33064
Windows Server 2012 R2Remote Code ExecutionImportant5061018Monthly RollupCVE-2025-33064
Windows Server 2012 (Server Core installation)Remote Code ExecutionImportant5061059Monthly RollupCVE-2025-33064
Windows Server 2012Remote Code ExecutionImportant5061059Monthly RollupCVE-2025-33064
Windows 10 for x64-based SystemsDenial of ServiceImportant5060998Security UpdateCVE-2025-32724
Windows 10 for 32-bit SystemsDenial of ServiceImportant5060998Security UpdateCVE-2025-32724
Windows Server 2025Denial of ServiceImportant5060842Security UpdateCVE-2025-32724
Windows Server 2025Denial of ServiceImportant5060841SecurityHotpatchUpdateCVE-2025-32724
Nuance Digital Engagement PlatformSpoofingImportantRelease NotesSecurity UpdateCVE-2025-47977
Microsoft AutoUpdate for MacElevation of PrivilegeImportantMAUSecurity UpdateCVE-2025-47968
Microsoft Visual Studio 2022 version 17.14Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2025-47959
Microsoft Visual Studio 2022 version 17.10Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2025-47959
Microsoft Visual Studio 2022 version 17.8Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2025-47959
Microsoft Visual Studio 2022 version 17.12Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2025-47959
Windows 11 Version 24H2 for x64-based SystemsSecurity Feature BypassImportant5060842Security UpdateCVE-2025-3052
Windows 11 Version 24H2 for x64-based SystemsSecurity Feature BypassImportant5060841SecurityHotpatchUpdateCVE-2025-3052
Windows 11 Version 24H2 for ARM64-based SystemsSecurity Feature BypassImportant5060842Security UpdateCVE-2025-3052
Windows 11 Version 24H2 for ARM64-based SystemsSecurity Feature BypassImportant5060841SecurityHotpatchUpdateCVE-2025-3052
Microsoft Office LTSC 2024 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2025-47176
Microsoft Office LTSC 2024 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2025-47176
Microsoft PowerPoint 2016 (64-bit edition)Remote Code ExecutionImportant5002689Security UpdateCVE-2025-47175
Microsoft PowerPoint 2016 (32-bit edition)Remote Code ExecutionImportant5002689Security UpdateCVE-2025-47175
Microsoft Office LTSC for Mac 2024Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2025-47175
Microsoft Office LTSC 2021 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2025-47175
Microsoft Office LTSC 2021 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2025-47175
Microsoft Office 2019 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2025-47175
Microsoft Office 2016 (64-bit edition)Remote Code ExecutionImportant5002730Security UpdateCVE-2025-47173
Microsoft Office 2016 (32-bit edition)Remote Code ExecutionImportant5002730Security UpdateCVE-2025-47173
Microsoft SharePoint Server Subscription EditionRemote Code ExecutionCritical5002736Security UpdateCVE-2025-47172
Microsoft SharePoint Server 2019Remote Code ExecutionCritical5002729Security UpdateCVE-2025-47172
Microsoft SharePoint Enterprise Server 2016Remote Code ExecutionCritical5002732Security UpdateCVE-2025-47172
Microsoft Outlook 2016 (64-bit edition)Remote Code ExecutionImportant5002683Security UpdateCVE-2025-47171
Microsoft Outlook 2016 (32-bit edition)Remote Code ExecutionImportant5002683Security UpdateCVE-2025-47171
Microsoft Word 2016 (64-bit edition)Remote Code ExecutionImportant5002710Security UpdateCVE-2025-47169
Microsoft Word 2016 (32-bit edition)Remote Code ExecutionImportant5002710Security UpdateCVE-2025-47169
Microsoft SharePoint Server 2019Remote Code ExecutionImportant5002727Security UpdateCVE-2025-47169
Microsoft SharePoint Enterprise Server 2016Remote Code ExecutionImportant5002731Security UpdateCVE-2025-47169
Microsoft Office 2016 (64-bit edition)Remote Code ExecutionCritical5002616Security UpdateCVE-2025-47167
Microsoft Office 2016 (32-bit edition)Remote Code ExecutionCritical5002616Security UpdateCVE-2025-47167
Microsoft Office for AndroidRemote Code ExecutionCriticalRelease NotesSecurity UpdateCVE-2025-47167
Microsoft Excel 2016 (64-bit edition)Remote Code ExecutionImportant5002735Security UpdateCVE-2025-47165
Microsoft Excel 2016 (32-bit edition)Remote Code ExecutionImportant5002735Security UpdateCVE-2025-47165
Office Online ServerRemote Code ExecutionImportant5002728Security UpdateCVE-2025-47165
Windows Server 2012 R2 (Server Core installation)Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2012 R2Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2012 (Server Core installation)Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2012Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2008 R2 for x64-based Systems Service Pack 1Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2008 for 32-bit Systems Service Pack 2Remote Code ExecutionImportant5060996IE CumulativeCVE-2025-33053
Windows Server 2025Information DisclosureImportant5058411Security UpdateCVE-2025-47969
Windows Server 2025Information DisclosureImportant5058497SecurityHotpatchUpdateCVE-2025-47969
Windows 11 Version 24H2 for x64-based SystemsInformation DisclosureImportant5058411Security UpdateCVE-2025-47969
Windows 11 Version 24H2 for x64-based SystemsInformation DisclosureImportant5058497SecurityHotpatchUpdateCVE-2025-47969
Windows 11 Version 24H2 for ARM64-based SystemsInformation DisclosureImportant5058411Security UpdateCVE-2025-47969
Windows 11 Version 24H2 for ARM64-based SystemsInformation DisclosureImportant5058497SecurityHotpatchUpdateCVE-2025-47969
Windows SDKElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2025-47962
Windows Security AppSpoofingImportantInformationSecurity UpdateCVE-2025-47956
Windows Server 2012 R2 (Server Core installation)Elevation of PrivilegeImportant5058403Monthly RollupCVE-2025-47955
Windows Server 2012 R2Elevation of PrivilegeImportant5058403Monthly RollupCVE-2025-47955
Windows Server 2012 (Server Core installation)Elevation of PrivilegeImportant5058451Monthly RollupCVE-2025-47955
Windows Server 2012Elevation of PrivilegeImportant5058451Monthly RollupCVE-2025-47955
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5058430Monthly RollupCVE-2025-47955
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5058454Security OnlyCVE-2025-47955
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5058430Monthly RollupCVE-2025-47955
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5058454Security OnlyCVE-2025-47955
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5061198Monthly RollupCVE-2025-47955
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5058429Security OnlyCVE-2025-47955
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5061198Monthly RollupCVE-2025-47955
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5058429Security OnlyCVE-2025-47955
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5061198Monthly RollupCVE-2025-47955
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5058429Security OnlyCVE-2025-47955
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5061198Monthly RollupCVE-2025-47955
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5058429Security OnlyCVE-2025-47955
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportant5058383Security UpdateCVE-2025-47955
Windows Server 2016Elevation of PrivilegeImportant5058383Security UpdateCVE-2025-47955
Windows 10 Version 1607 for x64-based SystemsElevation of PrivilegeImportant5058383Security UpdateCVE-2025-47955
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportant5058383Security UpdateCVE-2025-47955
Windows 10 for x64-based SystemsElevation of PrivilegeImportant5058387Security UpdateCVE-2025-47955
Windows 10 for 32-bit SystemsElevation of PrivilegeImportant5058387Security UpdateCVE-2025-47955
Windows Server 2022, 23H2 Edition (Server Core installation)Elevation of PrivilegeImportant5058384Security UpdateCVE-2025-47955
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportant5058379Security UpdateCVE-2025-47955
Windows 10 Version 21H2 for ARM64-based SystemsElevation of PrivilegeImportant5058379Security UpdateCVE-2025-47955
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5058379Security UpdateCVE-2025-47955
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5058385Security UpdateCVE-2025-47955
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5058500SecurityHotpatchUpdateCVE-2025-47955
Windows Server 2022Elevation of PrivilegeImportant5058385Security UpdateCVE-2025-47955
Windows Server 2022Elevation of PrivilegeImportant5058500SecurityHotpatchUpdateCVE-2025-47955
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5058392Security UpdateCVE-2025-47955
Windows Server 2019Elevation of PrivilegeImportant5058392Security UpdateCVE-2025-47955
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5058392Security UpdateCVE-2025-47955
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5058392Security UpdateCVE-2025-47955
Remote Desktop client for Windows DesktopInformation DisclosureImportantRelease NotesSecurity UpdateCVE-2025-32715
Windows App Client for Windows DesktopInformation DisclosureImportantRelease NotesSecurity UpdateCVE-2025-32715
.NET 9.0 installed on WindowsRemote Code ExecutionImportant5061936Security UpdateCVE-2025-30399
.NET 9.0 installed on Mac OSRemote Code ExecutionImportant5061936Security UpdateCVE-2025-30399
.NET 9.0 installed on LinuxRemote Code ExecutionImportant5061936Security UpdateCVE-2025-30399
.NET 8.0 installed on Mac OSRemote Code ExecutionImportant5061935Security UpdateCVE-2025-30399
.NET 8.0 installed on LinuxRemote Code ExecutionImportant5061935Security UpdateCVE-2025-30399
.NET 8.0 installed on WindowsRemote Code ExecutionImportant5061935Security UpdateCVE-2025-30399

Quality and experience updates

For users running Windows 11 versions 24H2, 23H2, and 22H2, the latest update brings several new features, including a new keyboard shortcut for opening Copilot, a new Drag Tray share UI, and Windows Share image editing features. Microsoft has also introduced a new policy that lets IT admins manage Energy Saver settings on Windows 11 devices via group policies and MDM configurations using Microsoft Intune.

The Click to Do feature is now also available to users in the European Economic Area (EEA). In addition, administrators can configure taskbar policies that allow users to unpin specific apps, ensuring they don’t reappear after the next policy refresh. Keep in mind that Microsoft is gradually rolling out the latest Patch Tuesday updates to PCs running Windows 11 version 24H2. The company has identified a compatibility issue that affects select Windows 11 devices.

For Windows 10 users on versions 22H2 and 21H2, the KB5060533 cumulative update includes a few notable changes. It restores the clock view showing seconds on the Calendar taskbar flyout and fixes a bug that caused certain Hyper-V virtual machines running Windows 10, Windows 11, or Windows Server to freeze or reboot unexpectedly.

Windows Update testing and best practices

Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary, as hackers start to work out how to weaponize newly reported vulnerabilities.

A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.

There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system or files and folders on a granular basis.