Microsoft
In their June Patch Tuesday release, Microsoft has addressed 66 vulnerabilities, including one actively exploited zero-day vulnerability and another zero-day that was publicly disclosed.
The actively exploited zero-day vulnerability in today's updates is:
CVE-2025-33053 - Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability. This critical zero-day vulnerability (CVE-2025-33053) in Microsoft Windows WebDAV has been exploited in targeted attacks, according to new research from Check Point. The flaw allows remote code execution if a user clicks on a specially crafted WebDAV link. In March 2025, Check Point detected an attempted attack on a Turkish defence firm by the APT group "Stealth Falcon", who used a novel technique involving a legitimate Windows tool to execute files from a malicious WebDAV server.
The publicly disclosed zero-day is:
CVE-2025-33073 - Windows SMB Client Elevation of Privilege Vulnerability.
Microsoft has patched a critical vulnerability in Windows SMB that could allow attackers to gain SYSTEM-level privileges. The flaw, caused by improper access control, enables an attacker to elevate privileges by coercing a targeted machine to authenticate to a malicious SMB server using a crafted script. Though Microsoft has not detailed how the flaw was disclosed, reports suggest DFN-CERT and RedTeam Pentesting raised early warnings. A security update is now available, and the issue can also be mitigated by enforcing SMB signing through Group Policy.
This Patch Tuesday also fixes ten critical vulnerabilities, eight being remote code execution vulnerabilities and two being elevation of privileges bugs. Those 10 critical vulnerabilities affect Microsoft Office, Microsoft Office Sharepoint, Windows Cryptographic Services, KDC Proxy Service, Remote Desktop Services and Windows Netlogon.
Adobe
Adobe released security updates for InCopy, Experience Manager, Commerce, InDesign, Substance 3D Sampler, Acrobat Reader, and Substance 3D Painter.
Cisco
Since our May Blog, Cisco has released 24 advisories, with the impact ratings ranging from Medium to Critical. CISO has given 3 of those vulnerabilities a ‘Critical’ impact rating. These impact CISCO IOS XE Wireless Controller Software, cloud deployed Identity Services Engine and multiple products with an RCE in Erlang/OTP SSH Server.
Citrix
Citrix has not released any new Security Updates this month.
Fortinet
Fortinet has published/updated 2 advisories since our May Blog. One of which is rated critical, the other is High. Both advisories impact multiple products.
The critical advisory, was published in our May Blog, but updated on the 28th May. CVE-2025-22252 is an authentication bypass vulnerability in FortiOS, FortiProxy, and FortiSwitchManager TACACS+ configurations that use a remote TACACS+ server with ASCII authentication. It can allow an attacker with knowledge of an existing admin account to gain access as a valid admin.
Ivanti
Ivanti has issued security updates to address three high-severity vulnerabilities in its Workspace Control (IWC) solution. The flaws stem from hardcoded, unchangeable cryptographic keys, which could allow local authenticated attackers to decrypt stored credentials and escalate privileges. Two of the vulnerabilities (CVE-2025-5353 and CVE-2025-22455) affect SQL credentials in IWC versions 10.19.0.0 and earlier, while a third (CVE-2025-22463) enables decryption of the stored environment password. Ivanti warns that successful exploitation could lead to credential compromise and system-level impact.
SAP
On the 10th June as part of its Security Patch day, SAP released 14 new Security Notes, one of which is rated Critical. A further 5 are rated High. The products affected by the critical and high advisories are:
· SAP NetWeaver (Critical)
· SAP GRC
· SAP Business Warehouse
· SAP BusinessObjects Business Intelligence Platform
· SAP Netweaver Visual Composer
· SAP MDM Server
Industrial Control Systems
Since our May Blog, the CyberSecurity and Infrastructure Agency (CISA) released the following advisories for Industrial Control Systems. Any clients utilising these systems should check the list below to determine if they are using vulnerable components within their systems.
- ICSA-25-155-01 CyberData 011209 SIP Emergency Intercom
- ICSA-25-155-02 Hitachi Energy Relion 670, 650 series and SAM600-IO Product
- ICSA-21-049-02 Mitsubishi Electric FA Engineering Software Products (Update H)
- ICSA-25-133-02 Hitachi Energy Relion 670/650/SAM600-IO Series (Update A)
- ICSA-23-068-05 Hitachi Energy Relion 670, 650 and SAM600-IO Series (Update A)
- ICSA-21-336-05 Hitachi Energy Relion 670/650/SAM600-IO (Update A)
ICSA-23-089-01 Hitachi Energy IEC 61850 MMS-Server (Update A)
- ICSA-25-153-01 Schneider Electric Wiser Home Automation
- ICSA-25-153-02 Schneider Electric EcoStruxure Power Build Rapsody
- ICSA-25-153-03 Mitsubishi Electric MELSEC iQ-F Series
- ICSA-25-148-01 Siemens SiPass
- ICSA-25-148-02 Siemens SiPass Integrated
- ICSA-25-148-03 Consilium Safety CS5000 Fire Panel
- ICSA-25-148-04 Instantel Micromate
- ICSMA-25-148-01 Santesoft Sante DICOM Viewer Pro
- ICSA-25-146-01 Johnson Controls iSTAR Configuration Utility (ICU) Tool
- ICSA-25-142-01 Lantronix Device Installer
- ICSA-25-142-02 Rockwell Automation FactoryTalk Historian ThingWorx
- ICSA-25-140-01 ABUP IoT Cloud Platform
- ICSA-25-140-02 National Instruments Circuit Design Suite
- ICSA-25-140-03 Danfoss AK-SM 8xxA Series
- ICSA-25-140-04 Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products
- ICSA-25-140-05 Siemens Surveillance Video
- ICSA-25-140-06 Schneider Electric PrismaSeT Active - Wireless Panel Server
- ICSA-25-140-07 Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL
- ICSA-25-140-08 Schneider Electric Modicon Controllers
- ICSA-25-140-09 AutomationDirect MB-Gateway
- ICSA-25-140-10 Vertiv Liebert RDU101 and UNITY
- ICSA-25-140-11 Assured Telematics Inc (ATI) Fleet Management System with Geotab Integration
- ICSA-25-037-01 Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update B)
- ICSA-25-023-05 Schneider Electric EcoStruxure Power Build Rapsody (Update A)
CISA advises users and administrators to review these newly released advisories for technical details and to apply the appropriate mitigations.
May Highlights
May 21st 2025 – CISA issued the following advisory, around Russian Actors targeting Western Logistics and Technology companies. Although the report contains no evidence of an identified threat against UK companies, the report details TTP’s and provides actionable intelligence and has been endorsed by the UK NCSC.
A PDF of the report is available here.
As always, users are recommended to apply the latest security updates as soon as possible to protect their systems from potential threats.
