Microsoft’s May 2025 Patch Tuesday enhances both security and user experience across Windows 10 and 11.
Key Takeaways:
Microsoft has rolled out the May 2025 Patch Tuesday updates, delivering not only the routine security fixes but also several notable quality enhancements for Windows 11 and Windows 10. This month’s release includes an impressive 74 patches addressing vulnerabilities across Windows and its components, Office, Azure, Remote Desktop Gateway Service, Microsoft Defender, and more.
On the quality and experience updates front, Microsoft has rolled out the KB5058411 patch for Windows 11 version 24H2, which brings AI-powered Recall and Click to Do features for Copilot+ PCs. On Windows 11 version 23H2, the KB5058405 update adds new pivot-based curated views in File Explorer Home, improved performance with ZIP files, and enhanced support for text scaling.
This month, Microsoft has patched 12 critical vulnerabilities and the rest are rated Important in severity. The company has warned that five vulnerabilities are under attack right now targeting Windows 10 and 11 PCs as well as Windows Server machines. Let’s take a look at the most important vulnerabilities Microsoft fixed in the May 2025 Patch Tuesday updates.
You can find below the full list of CVEs included in this month’s Patch Tuesday:
Product | Impact | Max Severity | Article | Download | Build Number | Details |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5058449 | Monthly Rollup | 6.0.6003.23279 | CVE-2025-24063 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5058429 | Security Only | 6.0.6003.23279 | CVE-2025-24063 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5058383 | Security Update | 10.0.14393.8066 | CVE-2025-24063 |
Windows Server 2016 | Elevation of Privilege | Important | 5058383 | Security Update | 10.0.14393.8066 | CVE-2025-24063 |
Windows 10 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 5058379 | Security Update | 10.0.19045.5854 | CVE-2025-30397 |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 5058405 | Security Update | 10.0.22621.5335 | CVE-2025-30397 |
Windows 11 Version 22H2 for ARM64-based Systems | Remote Code Execution | Important | 5058405 | Security Update | 10.0.22621.5335 | CVE-2025-30397 |
Windows 10 Version 21H2 for x64-based Systems | Remote Code Execution | Important | 5058379 | Security Update | 10.0.19044.5854 | CVE-2025-30397 |
Windows 10 Version 21H2 for ARM64-based Systems | Remote Code Execution | Important | 5058379 | Security Update | 10.0.19044.5854 | CVE-2025-30397 |
Windows 10 Version 21H2 for 32-bit Systems | Remote Code Execution | Important | 5058379 | Security Update | 10.0.19044.5854 | CVE-2025-30397 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5058385 | Security Update | 10.0.20348.3692 | CVE-2025-30397 |
Windows Server 2022 | Remote Code Execution | Important | 5058385 | Security Update | 10.0.20348.3692 | CVE-2025-30397 |
Windows Server 2022 | Remote Code Execution | Important | 5058500 | SecurityHotpatchUpdate | 10.0.20348.3630 | CVE-2025-30397 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Important | 5058392 | Security Update | 10.0.17763.7314 | CVE-2025-30397 |
Windows Server 2019 | Remote Code Execution | Important | 5058392 | Security Update | 10.0.17763.7314 | CVE-2025-30397 |
Windows 10 Version 1607 for x64-based Systems | Information Disclosure | Important | 5058383 | Security Update | 10.0.14393.8066 | CVE-2025-29974 |
Windows 10 Version 1607 for 32-bit Systems | Information Disclosure | Important | 5058383 | Security Update | 10.0.14393.8066 | CVE-2025-29974 |
Windows 10 for x64-based Systems | Information Disclosure | Important | 5058387 | Security Update | 10.0.10240.21014 | CVE-2025-29974 |
Windows 10 for 32-bit Systems | Information Disclosure | Important | 5058387 | Security Update | 10.0.10240.21014 | CVE-2025-29974 |
Windows Server 2025 | Information Disclosure | Important | 5058411 | Security Update | 10.0.26100.4061 | CVE-2025-29974 |
Windows Server 2025 | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | 10.0.26100.3981 | CVE-2025-29974 |
Windows 11 Version 24H2 for x64-based Systems | Information Disclosure | Important | 5058411 | Security Update | 10.0.26100.4061 | CVE-2025-29974 |
Windows 11 Version 24H2 for x64-based Systems | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | 10.0.26100.3981 | CVE-2025-29974 |
Windows 11 Version 24H2 for ARM64-based Systems | Information Disclosure | Important | 5058411 | Security Update | 10.0.26100.4061 | CVE-2025-29974 |
Windows 11 Version 24H2 for ARM64-based Systems | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | 10.0.26100.3981 | CVE-2025-29974 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Information Disclosure | Important | 5058384 | Security Update | 10.0.25398.1611 | CVE-2025-29974 |
Windows 11 Version 23H2 for x64-based Systems | Information Disclosure | Important | 5058405 | Security Update | 10.0.22631.5335 | CVE-2025-29961 |
Windows 11 Version 23H2 for ARM64-based Systems | Information Disclosure | Important | 5058405 | Security Update | 10.0.22631.5335 | CVE-2025-29961 |
Windows Server 2025 (Server Core installation) | Information Disclosure | Important | 5058411 | Security Update | 10.0.26100.4061 | CVE-2025-29961 |
Windows Server 2025 (Server Core installation) | Information Disclosure | Important | 5058497 | SecurityHotpatchUpdate | 10.0.26100.3981 | CVE-2025-29961 |
Windows 10 Version 22H2 for 32-bit Systems | Information Disclosure | Important | 5058379 | Security Update | 10.0.19045.5854 | CVE-2025-29961 |
Windows 10 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5058379 | Security Update | 10.0.19045.5854 | CVE-2025-29961 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Information Disclosure | Important | 5058430 | Monthly Rollup | 6.1.7601.27729 | CVE-2025-29956 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Information Disclosure | Important | 5058454 | Security Only | 6.1.7601.27729 | CVE-2025-29956 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Information Disclosure | Important | 5058430 | Monthly Rollup | 6.1.7601.27729 | CVE-2025-29956 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Information Disclosure | Important | 5058454 | Security Only | 6.1.7601.27729 | CVE-2025-29956 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5058449 | Monthly Rollup | 6.0.6003.23279 | CVE-2025-29956 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5058429 | Security Only | 6.0.6003.23279 | CVE-2025-29956 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Information Disclosure | Important | 5058449 | Monthly Rollup | 6.0.6003.23279 | CVE-2025-29956 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Information Disclosure | Important | 5058429 | Security Only | 6.0.6003.23279 | CVE-2025-29956 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5058449 | Monthly Rollup | 6.0.6003.23279 | CVE-2025-29956 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5058429 | Security Only | 6.0.6003.23279 | CVE-2025-29956 |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30393 |
Windows Server 2012 R2 (Server Core installation) | Elevation of Privilege | Important | 5058403 | Monthly Rollup | 6.3.9600.22577 | CVE-2025-27468 |
Windows Server 2012 R2 | Elevation of Privilege | Important | 5058403 | Monthly Rollup | 6.3.9600.22577 | CVE-2025-27468 |
Windows Server 2012 (Server Core installation) | Elevation of Privilege | Important | 5058451 | Monthly Rollup | 6.2.9200.25475 | CVE-2025-27468 |
Windows Server 2012 | Elevation of Privilege | Important | 5058451 | Monthly Rollup | 6.2.9200.25475 | CVE-2025-27468 |
Microsoft Office 2019 for 32-bit editions | Remote Code Execution | Critical | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30377 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002717 | Security Update | 16.0.5500.1000 | CVE-2025-30376 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002717 | Security Update | 16.0.5500.1000 | CVE-2025-30376 |
Microsoft Office LTSC 2024 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30376 |
Microsoft Office LTSC 2024 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30376 |
Microsoft Office LTSC 2021 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30376 |
Microsoft Office LTSC 2021 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30376 |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-30376 |
Windows 10 Version 1809 for x64-based Systems | Remote Code Execution | Important | 5058392 | Security Update | 10.0.17763.7314 | CVE-2025-29969 |
Windows 10 Version 1809 for 32-bit Systems | Remote Code Execution | Important | 5058392 | Security Update | 10.0.17763.7314 | CVE-2025-29969 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002695 | Security Update | 16.0.5500.1001 | CVE-2025-32704 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002695 | Security Update | 16.0.5500.1001 | CVE-2025-32704 |
Microsoft Office 2019 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2025-32704 |
Microsoft Visual Studio 2022 version 17.10 | Remote Code Execution | Important | Release Notes | Security Update | 17.10.14 | CVE-2025-32702 |
Microsoft Visual Studio 2022 version 17.8 | Remote Code Execution | Important | Release Notes | Security Update | 17.8.21 | CVE-2025-32702 |
Microsoft Visual Studio 2022 version 17.13 | Remote Code Execution | Important | Release Notes | Security Update | 17.13.7 | CVE-2025-32702 |
Microsoft Visual Studio 2022 version 17.12 | Remote Code Execution | Important | Release Notes | Security Update | 17.12.8 | CVE-2025-32702 |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 – 16.10) | Remote Code Execution | Important | Release Notes | Security Update | 16.11.47 | CVE-2025-32702 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2012 | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5058380 | IE Cumulative | 1.003 | CVE-2025-30397 |
Microsoft Office LTSC for Mac 2024 | Remote Code Execution | Important | Release Notes | Security Update | 16.97.25042725 | CVE-2025-30388 |
Microsoft Office for Universal | Remote Code Execution | Important | Release Notes | Security Update | 16.0.14326.22502 | CVE-2025-30388 |
Microsoft Office for Android | Remote Code Execution | Important | Release Notes | Security Update | 16.0.18827.20000 | CVE-2025-30388 |
Microsoft Office LTSC for Mac 2021 | Remote Code Execution | Important | Release Notes | Security Update | 16.97.25042725 | CVE-2025-30388 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Critical | 5058500 | SecurityHotpatchUpdate | 10.0.20348.3630 | CVE-2025-29833 |
Microsoft Defender for Identity | Spoofing | Important | CVE-2025-26685 | |||
Windows HLK for Windows Server 2019 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.17763.7010 | CVE-2025-27488 |
Windows HLK for Windows 10 version 2004 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.19041.5609 | CVE-2025-27488 |
Windows 10 HLK version 21H2 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.19041.5609 | CVE-2025-27488 |
Windows 10 HLK Version 22H2 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.19041.5609 | CVE-2025-27488 |
Windows 10 HLK version 20H2 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.19041.5609 | CVE-2025-27488 |
Windows HLK for Windows Server 2022 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.20348.3330 | CVE-2025-27488 |
Windows 11 HLK 22H2 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.22621.5040 | CVE-2025-27488 |
Windows 10 HLK version 21H1 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.19041.5609 | CVE-2025-27488 |
Windows HLK Version 1809 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.17763.7010 | CVE-2025-27488 |
Windows 11 HLK 24H2 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.26100.3478 | CVE-2025-27488 |
Windows HLK for Windows Server 2025 | Elevation of Privilege | Important | Release Notes | Security Update | 10.1.26100.3478 | CVE-2025-27488 |
Visual Studio Code | Security Feature Bypass | Important | Release Notes | Security Update | 1.100.1 | CVE-2025-21264 |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 – 15.8) | Information Disclosure | Important | Release Notes | Security Update | 15.9.73 | CVE-2025-32703 |
Microsoft Dataverse | Elevation of Privilege | Important | Release Notes | Security Update | 3.4.0.1406 | CVE-2025-29826 |
Azure AI Document Intelligence Studio | Elevation of Privilege | Important | Release Notes | Security Update | 1.0.03019.1-official-7241c17a | CVE-2025-30387 |
Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Critical | 5002711 | Security Update | 16.0.5500.1002 | CVE-2025-30386 |
Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Critical | 5002711 | Security Update | 16.0.5500.1002 | CVE-2025-30386 |
Microsoft SharePoint Server Subscription Edition | Remote Code Execution | Important | 5002709 | Security Update | 16.0.18526.20286 | CVE-2025-30384 |
Microsoft SharePoint Server 2019 | Remote Code Execution | Important | 5002708 | Security Update | 16.0.10417.20010 | CVE-2025-30384 |
Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Important | 5002722 | Security Update | 16.0.5500.1001 | CVE-2025-30384 |
Office Online Server | Remote Code Execution | Important | 5002707 | Security Update | 16.0.10417.20010 | CVE-2025-30383 |
Microsoft Excel 2016 (64-bit edition) | Remote Code Execution | Important | 5002716 | Security Update | 16.0.5500.1000 | CVE-2025-30379 |
Microsoft Excel 2016 (32-bit edition) | Remote Code Execution | Important | 5002716 | Security Update | 16.0.5500.1000 | CVE-2025-30379 |
Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Important | 5002717 | Security Update | 16.0.5500.1000 | CVE-2025-29979 |
Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Important | 5002717 | Security Update | 16.0.5500.1000 | CVE-2025-29979 |
Microsoft SharePoint Server 2019 | Elevation of Privilege | Important | 5002706 | Security Update | 16.0.10417.20010 | CVE-2025-29976 |
Microsoft SharePoint Enterprise Server 2016 | Elevation of Privilege | Important | 5002712 | Security Update | 16.0.5500.1001 | CVE-2025-29976 |
Microsoft PC Manager | Elevation of Privilege | Important | Release Notes | Security Update | 3.16.1.0 | CVE-2025-29975 |
Azure File Sync v20.0 | Elevation of Privilege | Important | Release Notes | N/A | 5041884 | CVE-2025-29973 |
Azure File Sync v19.0 | Elevation of Privilege | Important | Release Notes | N/A | 26100 | CVE-2025-29973 |
Remote Desktop client for Windows Desktop | Remote Code Execution | Critical | Release Notes | Security Update | 1.2.6228.0 | CVE-2025-29967 |
Windows App Client for Windows Desktop | Remote Code Execution | Critical | Release Notes | Security Update | 2.0.420 | CVE-2025-29967 |
Microsoft Defender for Endpoint for Linux | Elevation of Privilege | Important | Release Notes | Security Update | 101.25XXX | CVE-2025-26684 |
Build Tools for Visual Studio 2022 | Spoofing | Important | Release Notes | Security Update | Fixed Version 17.13.7 | CVE-2025-26646 |
.NET 9.0 installed on Windows | Spoofing | Important | 5059201 | Security Update | 9.0.5 | CVE-2025-26646 |
.NET 9.0 installed on Mac OS | Spoofing | Important | 5059201 | Security Update | 9.0.5 | CVE-2025-26646 |
.NET 9.0 installed on Linux | Spoofing | Important | 5059201 | Security Update | 9.0.5 | CVE-2025-26646 |
.NET 8.0 installed on Mac OS | Spoofing | Important | 5059200 | Security Update | 8.0.16 | CVE-2025-26646 |
.NET 8.0 installed on Linux | Spoofing | Important | 5059200 | Security Update | 8.0.16 | CVE-2025-26646 |
.NET 8.0 installed on Windows | Spoofing | Important | 5059200 | Security Update | 8.0.16 | CVE-2025-26646 |
If you’re running Windows 11 version 24H2, the KB5058411 update enables the AI-powered Windows Recall and Click to Do features on Copilot+ PCs. It also brings the new AI-based search experience on AMD and Intel models. Moreover, this release introduces a new Phone Link sidebar for the Start menu, a new Speech recap feature for Narrator, as well as pivot-based curated views in File Explorer Home, and more. These enhancements are also available for users running Windows 11 version 23H2.
For Windows 10 version 22H2, this update brings a couple of security improvements to internal Windows OS functionality. It also includes new blocklist drivers with security vulnerabilities that have been exploited by attackers in Bring Your Own Vulnerable Driver (BYOVD) attacks.
Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.
A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.