Microsoft patches 66 vulnerabilities in June update, including critical RCE flaws and a zero-day exploit.
Key Takeaways:
Microsoft has released the June 2025 Patch Tuesday updates for Windows 11 and Windows 10 PCs. On the security front, the company has addressed over 60 vulnerabilities in Windows and Windows Components, Office, and other components.
On the quality and experiences update front, Microsoft has fixed an issue that was previously preventing users from signing in with self-signed certificates when using Windows Hello for Business with the Key Trust model on Windows 11 PCs. The company has also addressed an issue with Hyper-V virtual machines on Windows 10, Windows 11, and Windows Server.
As pointed out by the Zero Day Initiative, Microsoft has fixed 66 new vulnerabilities this month, including 10 Critical ones. However, one of them is currently being exploited by attackers. Let’s take a look at the most important vulnerabilities Microsoft fixed this month:
You can find below the full list of security patches Microsoft released this month:
Product | Impact | Max Severity | Article | Download | Details |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Remote Code Execution | Critical | Click to Run | Security Update | CVE-2025-32717 |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Remote Code Execution | Critical | Click to Run | Security Update | CVE-2025-32717 |
Microsoft Office LTSC for Mac 2021 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-47173 |
Microsoft Office 2019 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-47173 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5061078 | Monthly Rollup | CVE-2025-33073 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5061036 | Security Only | CVE-2025-33073 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5061078 | Monthly Rollup | CVE-2025-33073 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5061036 | Security Only | CVE-2025-33073 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5061026 | Monthly Rollup | CVE-2025-33073 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5061072 | Security Only | CVE-2025-33073 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5061026 | Monthly Rollup | CVE-2025-33073 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5061072 | Security Only | CVE-2025-33073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5061026 | Monthly Rollup | CVE-2025-33073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5061072 | Security Only | CVE-2025-33073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5061026 | Monthly Rollup | CVE-2025-33073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5061072 | Security Only | CVE-2025-33073 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5061010 | Security Update | CVE-2025-33073 |
Windows Server 2016 | Elevation of Privilege | Important | 5061010 | Security Update | CVE-2025-33073 |
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5061010 | Security Update | CVE-2025-33073 |
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5061010 | Security Update | CVE-2025-33073 |
Windows 11 Version 23H2 for x64-based Systems | Denial of Service | Important | 5060999 | Security Update | CVE-2025-33057 |
Windows 11 Version 23H2 for ARM64-based Systems | Denial of Service | Important | 5060999 | Security Update | CVE-2025-33057 |
Windows Server 2025 (Server Core installation) | Denial of Service | Important | 5060842 | Security Update | CVE-2025-33057 |
Windows Server 2025 (Server Core installation) | Denial of Service | Important | 5060841 | SecurityHotpatchUpdate | CVE-2025-33057 |
Windows 10 Version 22H2 for 32-bit Systems | Denial of Service | Important | 5060533 | Security Update | CVE-2025-33057 |
Windows 10 Version 22H2 for ARM64-based Systems | Denial of Service | Important | 5060533 | Security Update | CVE-2025-33057 |
Windows 10 Version 22H2 for x64-based Systems | Denial of Service | Important | 5060533 | Security Update | CVE-2025-33057 |
Windows 11 Version 22H2 for x64-based Systems | Denial of Service | Important | 5060999 | Security Update | CVE-2025-33057 |
Windows 11 Version 22H2 for ARM64-based Systems | Denial of Service | Important | 5060999 | Security Update | CVE-2025-33057 |
Windows 10 Version 21H2 for x64-based Systems | Denial of Service | Important | 5060533 | Security Update | CVE-2025-33057 |
Windows 10 Version 21H2 for ARM64-based Systems | Denial of Service | Important | 5060533 | Security Update | CVE-2025-33057 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Important | 5060118 | Security Update | CVE-2025-33053 |
Windows 11 Version 23H2 for x64-based Systems | Elevation of Privilege | Important | 5058405 | Security Update | CVE-2025-47955 |
Windows 11 Version 23H2 for ARM64-based Systems | Elevation of Privilege | Important | 5058405 | Security Update | CVE-2025-47955 |
Windows Server 2025 (Server Core installation) | Elevation of Privilege | Important | 5058411 | Security Update | CVE-2025-47955 |
Windows Server 2025 (Server Core installation) | Elevation of Privilege | Important | 5058497 | SecurityHotpatchUpdate | CVE-2025-47955 |
Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5058379 | Security Update | CVE-2025-47955 |
Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5058379 | Security Update | CVE-2025-47955 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5058379 | Security Update | CVE-2025-47955 |
Windows 11 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5058405 | Security Update | CVE-2025-47955 |
Windows 11 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5058405 | Security Update | CVE-2025-47955 |
Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5060533 | Security Update | CVE-2025-33075 |
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5060526 | Security Update | CVE-2025-33075 |
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5060525 | SecurityHotpatchUpdate | CVE-2025-33075 |
Windows Server 2022 | Elevation of Privilege | Important | 5060526 | Security Update | CVE-2025-33075 |
Windows Server 2022 | Elevation of Privilege | Important | 5060525 | SecurityHotpatchUpdate | CVE-2025-33075 |
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5060531 | Security Update | CVE-2025-33075 |
Windows Server 2019 | Elevation of Privilege | Important | 5060531 | Security Update | CVE-2025-33075 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5060531 | Security Update | CVE-2025-33075 |
Windows 10 Version 1809 for 32-bit Systems | Information Disclosure | Important | 5060531 | Security Update | CVE-2025-33065 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5061018 | Monthly Rollup | CVE-2025-33064 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5061018 | Monthly Rollup | CVE-2025-33064 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Important | 5061059 | Monthly Rollup | CVE-2025-33064 |
Windows Server 2012 | Remote Code Execution | Important | 5061059 | Monthly Rollup | CVE-2025-33064 |
Windows 10 for x64-based Systems | Denial of Service | Important | 5060998 | Security Update | CVE-2025-32724 |
Windows 10 for 32-bit Systems | Denial of Service | Important | 5060998 | Security Update | CVE-2025-32724 |
Windows Server 2025 | Denial of Service | Important | 5060842 | Security Update | CVE-2025-32724 |
Windows Server 2025 | Denial of Service | Important | 5060841 | SecurityHotpatchUpdate | CVE-2025-32724 |
Nuance Digital Engagement Platform | Spoofing | Important | Release Notes | Security Update | CVE-2025-47977 |
Microsoft AutoUpdate for Mac | Elevation of Privilege | Important | MAU | Security Update | CVE-2025-47968 |
Microsoft Visual Studio 2022 version 17.14 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-47959 |
Microsoft Visual Studio 2022 version 17.10 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-47959 |
Microsoft Visual Studio 2022 version 17.8 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-47959 |
Microsoft Visual Studio 2022 version 17.12 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-47959 |
Windows 11 Version 24H2 for x64-based Systems | Security Feature Bypass | Important | 5060842 | Security Update | CVE-2025-3052 |
Windows 11 Version 24H2 for x64-based Systems | Security Feature Bypass | Important | 5060841 | SecurityHotpatchUpdate | CVE-2025-3052 |
Windows 11 Version 24H2 for ARM64-based Systems | Security Feature Bypass | Important | 5060842 | Security Update | CVE-2025-3052 |
Windows 11 Version 24H2 for ARM64-based Systems | Security Feature Bypass | Important | 5060841 | SecurityHotpatchUpdate | CVE-2025-3052 |
Microsoft Office LTSC 2024 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-47176 |
Microsoft Office LTSC 2024 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-47176 |
Microsoft PowerPoint 2016 (64-bit edition) | Remote Code Execution | Important | 5002689 | Security Update | CVE-2025-47175 |
Microsoft PowerPoint 2016 (32-bit edition) | Remote Code Execution | Important | 5002689 | Security Update | CVE-2025-47175 |
Microsoft Office LTSC for Mac 2024 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2025-47175 |
Microsoft Office LTSC 2021 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-47175 |
Microsoft Office LTSC 2021 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-47175 |
Microsoft Office 2019 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | CVE-2025-47175 |
Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Important | 5002730 | Security Update | CVE-2025-47173 |
Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Important | 5002730 | Security Update | CVE-2025-47173 |
Microsoft SharePoint Server Subscription Edition | Remote Code Execution | Critical | 5002736 | Security Update | CVE-2025-47172 |
Microsoft SharePoint Server 2019 | Remote Code Execution | Critical | 5002729 | Security Update | CVE-2025-47172 |
Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Critical | 5002732 | Security Update | CVE-2025-47172 |
Microsoft Outlook 2016 (64-bit edition) | Remote Code Execution | Important | 5002683 | Security Update | CVE-2025-47171 |
Microsoft Outlook 2016 (32-bit edition) | Remote Code Execution | Important | 5002683 | Security Update | CVE-2025-47171 |
Microsoft Word 2016 (64-bit edition) | Remote Code Execution | Important | 5002710 | Security Update | CVE-2025-47169 |
Microsoft Word 2016 (32-bit edition) | Remote Code Execution | Important | 5002710 | Security Update | CVE-2025-47169 |
Microsoft SharePoint Server 2019 | Remote Code Execution | Important | 5002727 | Security Update | CVE-2025-47169 |
Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Important | 5002731 | Security Update | CVE-2025-47169 |
Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Critical | 5002616 | Security Update | CVE-2025-47167 |
Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Critical | 5002616 | Security Update | CVE-2025-47167 |
Microsoft Office for Android | Remote Code Execution | Critical | Release Notes | Security Update | CVE-2025-47167 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002735 | Security Update | CVE-2025-47165 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002735 | Security Update | CVE-2025-47165 |
Office Online Server | Remote Code Execution | Important | 5002728 | Security Update | CVE-2025-47165 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2012 | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5060996 | IE Cumulative | CVE-2025-33053 |
Windows Server 2025 | Information Disclosure | Important | 5058411 | Security Update | CVE-2025-47969 |
Windows Server 2025 | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | CVE-2025-47969 |
Windows 11 Version 24H2 for x64-based Systems | Information Disclosure | Important | 5058411 | Security Update | CVE-2025-47969 |
Windows 11 Version 24H2 for x64-based Systems | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | CVE-2025-47969 |
Windows 11 Version 24H2 for ARM64-based Systems | Information Disclosure | Important | 5058411 | Security Update | CVE-2025-47969 |
Windows 11 Version 24H2 for ARM64-based Systems | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | CVE-2025-47969 |
Windows SDK | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2025-47962 |
Windows Security App | Spoofing | Important | Information | Security Update | CVE-2025-47956 |
Windows Server 2012 R2 (Server Core installation) | Elevation of Privilege | Important | 5058403 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2012 R2 | Elevation of Privilege | Important | 5058403 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2012 (Server Core installation) | Elevation of Privilege | Important | 5058451 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2012 | Elevation of Privilege | Important | 5058451 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5058430 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5058454 | Security Only | CVE-2025-47955 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5058430 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5058454 | Security Only | CVE-2025-47955 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5061198 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5058429 | Security Only | CVE-2025-47955 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5061198 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5058429 | Security Only | CVE-2025-47955 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5061198 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5058429 | Security Only | CVE-2025-47955 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5061198 | Monthly Rollup | CVE-2025-47955 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5058429 | Security Only | CVE-2025-47955 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5058383 | Security Update | CVE-2025-47955 |
Windows Server 2016 | Elevation of Privilege | Important | 5058383 | Security Update | CVE-2025-47955 |
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5058383 | Security Update | CVE-2025-47955 |
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5058383 | Security Update | CVE-2025-47955 |
Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5058387 | Security Update | CVE-2025-47955 |
Windows 10 for 32-bit Systems | Elevation of Privilege | Important | 5058387 | Security Update | CVE-2025-47955 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Elevation of Privilege | Important | 5058384 | Security Update | CVE-2025-47955 |
Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5058379 | Security Update | CVE-2025-47955 |
Windows 10 Version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5058379 | Security Update | CVE-2025-47955 |
Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5058379 | Security Update | CVE-2025-47955 |
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5058385 | Security Update | CVE-2025-47955 |
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5058500 | SecurityHotpatchUpdate | CVE-2025-47955 |
Windows Server 2022 | Elevation of Privilege | Important | 5058385 | Security Update | CVE-2025-47955 |
Windows Server 2022 | Elevation of Privilege | Important | 5058500 | SecurityHotpatchUpdate | CVE-2025-47955 |
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5058392 | Security Update | CVE-2025-47955 |
Windows Server 2019 | Elevation of Privilege | Important | 5058392 | Security Update | CVE-2025-47955 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5058392 | Security Update | CVE-2025-47955 |
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5058392 | Security Update | CVE-2025-47955 |
Remote Desktop client for Windows Desktop | Information Disclosure | Important | Release Notes | Security Update | CVE-2025-32715 |
Windows App Client for Windows Desktop | Information Disclosure | Important | Release Notes | Security Update | CVE-2025-32715 |
.NET 9.0 installed on Windows | Remote Code Execution | Important | 5061936 | Security Update | CVE-2025-30399 |
.NET 9.0 installed on Mac OS | Remote Code Execution | Important | 5061936 | Security Update | CVE-2025-30399 |
.NET 9.0 installed on Linux | Remote Code Execution | Important | 5061936 | Security Update | CVE-2025-30399 |
.NET 8.0 installed on Mac OS | Remote Code Execution | Important | 5061935 | Security Update | CVE-2025-30399 |
.NET 8.0 installed on Linux | Remote Code Execution | Important | 5061935 | Security Update | CVE-2025-30399 |
.NET 8.0 installed on Windows | Remote Code Execution | Important | 5061935 | Security Update | CVE-2025-30399 |
For users running Windows 11 versions 24H2, 23H2, and 22H2, the latest update brings several new features, including a new keyboard shortcut for opening Copilot, a new Drag Tray share UI, and Windows Share image editing features. Microsoft has also introduced a new policy that lets IT admins manage Energy Saver settings on Windows 11 devices via group policies and MDM configurations using Microsoft Intune.
The Click to Do feature is now also available to users in the European Economic Area (EEA). In addition, administrators can configure taskbar policies that allow users to unpin specific apps, ensuring they don’t reappear after the next policy refresh. Keep in mind that Microsoft is gradually rolling out the latest Patch Tuesday updates to PCs running Windows 11 version 24H2. The company has identified a compatibility issue that affects select Windows 11 devices.
For Windows 10 users on versions 22H2 and 21H2, the KB5060533 cumulative update includes a few notable changes. It restores the clock view showing seconds on the Calendar taskbar flyout and fixes a bug that caused certain Hyper-V virtual machines running Windows 10, Windows 11, or Windows Server to freeze or reboot unexpectedly.
Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary, as hackers start to work out how to weaponize newly reported vulnerabilities.
A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system or files and folders on a granular basis.