{"id":67379,"date":"2025-06-12T11:11:16","date_gmt":"2025-06-12T10:11:16","guid":{"rendered":"https:\/\/www.n-able.com\/?p=67379"},"modified":"2025-09-09T18:00:35","modified_gmt":"2025-09-09T17:00:35","slug":"patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise","title":{"rendered":"Patch Tuesday June 2025: Active WebDAV Exploitation and Unpatched BadSuccessor Allows Active Directory Compromise"},"content":{"rendered":"<p>June\u2019s Patch Tuesday delivers another substantial batch of vulnerability fixes, with system administrators and MSPs facing urgent patching decisions around an actively exploited zero-day vulnerability, critical Office vulnerabilities, and an unpatched vulnerability that potentially exists in all Domains with a Windows Server 2025 as a domain controller. Organizations will need to prioritize deployment schedules carefully this month, as the actively exploited WebDAV vulnerability demands immediate attention while multiple Office remote code execution flaws require swift remediation to prevent potential breach scenarios across enterprise environments.<\/p>\n<h2><span>Microsoft Vulnerabilities<\/span><\/h2>\n<p><span>Microsoft&#8217;s June 2025 Patch Tuesday addresses\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\" target=\"_blank\" rel=\"noopener\">66 vulnerabilities<\/a>\u00a0across its product portfolio, with 11 rated as critical and nine marked as Exploitation More Likely. The patch batch includes one actively exploited zero-day vulnerability and one publicly disclosed vulnerability, marking another month where threat actors have successfully weaponized Microsoft software flaws before patches became available.<\/span><\/p>\n<p><span>The most pressing concern is\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33053\" target=\"_blank\" rel=\"noopener\">CVE-2025-33053<\/a>, a remote code execution vulnerability in Windows Web Distributed Authoring and Versioning (WebDAV). This zero-day vulnerability has been actively exploited by the APT group \u00abStealth Falcon\u00bb in targeted attacks against defense companies,\u00a0<a href=\"https:\/\/research.checkpoint.com\/2025\/stealth-falcon-zero-day\/\" target=\"_blank\" rel=\"noopener\">according to Check Point Research<\/a>. The vulnerability allows unauthorized attackers to execute code over a network when users click on specially crafted WebDAV URLs. While WebDAV isn&#8217;t enabled by default in Windows, its presence in legacy systems makes it a relevant attack vector that requires immediate patching attention.<\/span><\/p>\n<p><span>The second zero-day vulnerability is\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33073\" target=\"_blank\" rel=\"noopener\">CVE-2025-33073<\/a>, an elevation of privilege vulnerability in the Windows Server Message Block (SMB) client. This publicly disclosed flaw allows authenticated attackers to elevate privileges over a network by executing crafted scripts that force target devices to connect to attacker-controlled machines using SMB credentials. The vulnerability has a CVSS score of 8.8 with multiple researchers receiving acknowledgement from Microsoft. This is one more tally mark in a long list of reasons why SMB is a challenge for defenders to deal with. <\/span><\/p>\n<p><span>For Microsoft Office vulnerability landscape this month there are multiple remote code execution flaws affecting core applications.\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47167\" target=\"_blank\" rel=\"noopener\">CVE-2025-47167<\/a>,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47164\" target=\"_blank\" rel=\"noopener\">CVE-2025-47164<\/a>, and\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47162\" target=\"_blank\" rel=\"noopener\">CVE-2025-47162<\/a>\u00a0are three critical Office RCE vulnerabilities that stem from type confusion, use-after-free, and heap-based buffer overflow conditions respectively. These vulnerabilities can be triggered through the Preview Pane, making them particularly dangerous as many users routinely preview attachments. Additionally,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32717\" target=\"_blank\" rel=\"noopener\">CVE-2025-32717<\/a>\u00a0represents another critical Word RCE vulnerability that can be exploited through malicious RTF files.<\/span><\/p>\n<p><span>Critical infrastructure components also received attention this month.\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33071\" target=\"_blank\" rel=\"noopener\">CVE-2025-33071<\/a>\u00a0affects the Windows KDC Proxy Service (KPSSVC), allowing unauthenticated attackers to leverage cryptographic protocol vulnerabilities in Kerberos to achieve remote code execution. Similarly,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33070\" target=\"_blank\" rel=\"noopener\">CVE-2025-33070<\/a>\u00a0represents a critical Windows Netlogon elevation of privilege vulnerability that could allow unauthorized network-based privilege escalation.<\/span><\/p>\n<h2><span>Emerging Active Directory Threats: The BadSuccessor Challenge<\/span><\/h2>\n<p><span>While Microsoft&#8217;s June Patch Tuesday addressed numerous immediate threats, a significant vulnerability in Windows Server 2025 remains unpatched and poses substantial risks to Active Directory environments worldwide. The\u00a0<a href=\"https:\/\/www.akamai.com\/blog\/security-research\/abusing-dmsa-for-privilege-escalation-in-active-directory\" target=\"_blank\" rel=\"noopener\">\u00abBadSuccessor\u00bb vulnerability<\/a>, discovered by Akamai researcher Yuval Gordon, exploits the delegated Managed Service Account (dMSA) feature introduced in Windows Server 2025.<\/span><\/p>\n<p><span>This privilege escalation vulnerability allows attackers to compromise any user in Active Directory, including Domain Administrators, by manipulating the dMSA migration process. The attack works by creating malicious dMSAs that inherit permissions from targeted accounts through the manipulation of a single attribute that the Key Distribution Center relies upon.\u00a0<\/span><\/p>\n<p><span>The vulnerability is particularly concerning because it functions with default configurations and doesn&#8217;t require the organization to actively use dMSAs. As long as a single Windows Server 2025 domain controller exists in the environment, the attack vector becomes available. Microsoft has acknowledged the issue but currently assesses it as moderate severity and has not committed to an immediate patch timeline, creating a significant gap between vendor assessment and security community concern.<\/span><\/p>\n<p><span>Organizations deploying Windows Server 2025 should immediately implement restrictive permissions around dMSA creation, monitor for new dMSA objects, and track authentication events associated with these accounts. The vulnerability represents a fundamental shift in Active Directory attack techniques and highlights the importance of thoroughly evaluating new features before deployment in production environments.<\/span><\/p>\n<h2><span>Other Vendor Vulnerabilities<\/span><\/h2>\n<h3><span style=\"text-decoration: underline\">Adobe<\/span><\/h3>\n<p><span>Adobe&#8217;s <a href=\"https:\/\/helpx.adobe.com\/security.html\" target=\"_blank\" rel=\"noopener\">June 2025 security release addresses 254 vulnerabilities<\/a> across seven products, with Adobe Experience Manager dominating the batch at 225 vulnerabilities (88.6% of total fixes) consisting almost entirely of cross-site scripting (XSS) flaws affecting both cloud service and on-premises deployments. The most critical issue is <a href=\"https:\/\/helpx.adobe.com\/security\/products\/magento\/apsb25-50.html\" target=\"_blank\" rel=\"noopener\">CVE-2025-47110<\/a> in Adobe Commerce with a CVSS score of 9.1, a reflected XSS vulnerability enabling arbitrary code execution alongside four other Commerce\/Magento vulnerabilities.<\/span><\/p>\n<h3><span style=\"text-decoration: underline\">Google<\/span><\/h3>\n<p><span>Google&#8217;s\u00a0<a href=\"https:\/\/www.techbeams.com\/google\/android\/google-android-security-update-for-june-2025\/\" target=\"_blank\" rel=\"noopener\">June 2025 Android security update<\/a>\u00a0addresses 34 high-severity vulnerabilities, with the most serious affecting the Android System component.\u00a0<a href=\"https:\/\/cyberscoop.com\/android-security-update-june-2025\/\" target=\"_blank\" rel=\"noopener\">CVE-2025-26443<\/a>\u00a0could enable local privilege escalation without requiring additional execution privileges, though user interaction is required for exploitation. The update includes fixes across Android Runtime, Framework, and System components.<\/span><\/p>\n<p><span>Google also addressed\u00a0<a href=\"https:\/\/www.helpnetsecurity.com\/2025\/05\/16\/cisa-recently-fixed-chrome-vulnerability-exploited-in-the-wild-cve-2025-4664\/\" target=\"_blank\" rel=\"noopener\">CVE-2025-4664<\/a>, a high-severity Chrome vulnerability that has been actively exploited in the wild. This flaw stems from insufficient policy enforcement in Chrome&#8217;s Loader component and can be triggered through maliciously crafted HTML pages to leak cross-origin data for account takeover attacks.<\/span><\/p>\n<h3><span style=\"text-decoration: underline\">Qualcomm<\/span><\/h3>\n<p><span>Qualcomm released security updates for\u00a0three zero-day vulnerabilities\u00a0in the Adreno Graphics Processing Unit (GPU) driver that are being exploited in limited, targeted attacks.\u00a0<a href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/june-2025-bulletin.html\" target=\"_blank\" rel=\"noopener\">CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038<\/a>\u00a0represent memory corruption vulnerabilities that could result from unauthorized command execution in GPU microcode. Google&#8217;s Threat Analysis Group identified these vulnerabilities as being Under Active Exploitation.<\/span><\/p>\n<h3><span style=\"text-decoration: underline\">SAP<\/span><\/h3>\n<p><span>SAP&#8217;s\u00a0<a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/june-2025.html\" target=\"_blank\" rel=\"noopener\">June 2025 Security Patch Day<\/a>\u00a0included fixes for 14 new security notes, with a critical missing authorization check vulnerability in SAP NetWeaver Application Server for ABAP receiving particular attention. This vulnerability allows attackers to bypass authorization checks and potentially escalate privileges within SAP environments.<\/span><\/p>\n<h3><span style=\"text-decoration: underline\">Fortinet<\/span><\/h3>\n<p><span>Fortinet released security updates for\u00a0<a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-167\" target=\"_blank\" rel=\"noopener\">OS command injection vulnerabilities<\/a>\u00a0in FortiManager, FortiAnalyzer, and FortiAnalyzer-BigData products. These vulnerabilities could allow attackers to execute arbitrary operating system commands on affected systems, potentially leading to full system compromise.<\/span><\/p>\n<h2><span>Vulnerability Prioritization<\/span><\/h2>\n<p><span>This month&#8217;s patch cycle demands careful prioritization given the mix of actively exploited vulnerabilities and critical infrastructure impacts. Organizations should focus their immediate attention on\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33053\" target=\"_blank\" rel=\"noopener\">CVE-2025-33053<\/a>, the actively exploited WebDAV zero-day, particularly in environments where legacy systems or specialized applications might have WebDAV components enabled.<\/span><\/p>\n<p><span>The multiple critical Microsoft Office vulnerabilities require rapid deployment scheduling, especially\u00a0CVE-2025-47167, CVE-2025-47164, CVE-2025-47162, and CVE-2025-32717, given their exploitation potential through the Preview Pane. Consider disabling Preview Pane functionality in high-risk environments until patches can be fully deployed and tested, or permanently disabling if the Preview Pane functionality isn\u2019t needed for workflows.<\/span><\/p>\n<p><span>The publicly disclosed SMB vulnerability\u00a0CVE-2025-33073\u00a0warrants immediate attention in environments with significant SMB traffic or where SMB signing is not enforced. Network segmentation and SMB signing enforcement provide additional protection layers while patches are deployed. While not under active exploitation expect it to quickly become part of threat actor arsenals. <\/span><\/p>\n<h3><span>BadSuccessor Vulnerability Priority<\/span><\/h3>\n<p><span>The unpatched BadSuccessor vulnerability demands immediate risk assessment and mitigation planning, despite the absence of a Microsoft security update. Organizations with Windows Server 2025 domain controllers face potential complete domain compromise through this Active Directory attack vector, making it a critical priority regardless of traditional patch management timelines. IT professionals should immediately audit permissions for dMSA creation rights, as <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/abusing-dmsa-for-privilege-escalation-in-active-directory\" target=\"_blank\" rel=\"noopener\">Akamai&#8217;s research shows 91% of tested environments<\/a> contained users outside domain admin groups with sufficient privileges to execute BadSuccessor attacks.<\/span><\/p>\n<p><span>Priority actions include restricting dMSA creation permissions to trusted administrators only, implementing comprehensive logging for dMSA-related authentication events, and deploying monitoring solutions to detect suspicious dMSA object creation or modification. Organizations should treat BadSuccessor mitigation with the same urgency as Actively Exploited vulnerabilities, given the technique&#8217;s potential for complete domain takeover and the current lack of vendor patches. MSPs managing multiple client environments should prioritize BadSuccessor risk assessments across their entire customer base, as a single compromised domain controller can enable lateral movement across the entire business network infrastructure.<\/span><\/p>\n<p><em>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/em><span>\u00a0<\/span><\/p>\n<table style=\"border: black 1px solid\">\n<tbody>\n<tr>\n<td width=\"20%\" style=\"border: black 1px solid;background-color: purple;padding-left: 5px;padding-right: 5px\">\n<p><strong style=\"color: white\">CVE Number<\/strong><\/p>\n<\/td>\n<td width=\"54%\" style=\"border: black 1px solid;background-color: purple;padding-left: 5px;padding-right: 5px\">\n<p><strong style=\"color: white\">CVE Title<\/strong><\/p>\n<\/td>\n<td width=\"10%\" style=\"border: black 1px solid;background-color: purple;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\"><strong style=\"color: white\">Severity<\/strong><\/p>\n<\/td>\n<td width=\"10%\" style=\"border: black 1px solid;background-color: purple;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\"><strong style=\"color: white\">Status<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33053\" target=\"_blank\" rel=\"noopener\">CVE-2025-33053<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">I<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ED<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47962\" target=\"_blank\" rel=\"noopener\">CVE-2025-47962<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows SDK Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">I<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47167\" target=\"_blank\" rel=\"noopener\">CVE-2025-47167<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Microsoft Office Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47164\" target=\"_blank\" rel=\"noopener\">CVE-2025-47164<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Microsoft Office Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47162\" target=\"_blank\" rel=\"noopener\">CVE-2025-47162<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Microsoft Office Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33071\" target=\"_blank\" rel=\"noopener\">CVE-2025-33071<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33070\" target=\"_blank\" rel=\"noopener\">CVE-2025-33070<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows Netlogon Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32717\" target=\"_blank\" rel=\"noopener\">CVE-2025-32717<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Microsoft Word Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32714\" target=\"_blank\" rel=\"noopener\">CVE-2025-32714<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows Installer Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">I<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32713\" target=\"_blank\" rel=\"noopener\">CVE-2025-32713<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">I<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">EML<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33073\" target=\"_blank\" rel=\"noopener\">CVE-2025-33073<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows SMB Client Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">I<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47953\" target=\"_blank\" rel=\"noopener\">CVE-2025-47953<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Microsoft Office Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47172\" target=\"_blank\" rel=\"noopener\">CVE-2025-47172<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32711\" target=\"_blank\" rel=\"noopener\">CVE-2025-32711<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>M365 Copilot Information Disclosure Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32710\" target=\"_blank\" rel=\"noopener\">CVE-2025-32710<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29828\" target=\"_blank\" rel=\"noopener\">CVE-2025-29828<\/a><\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p>Windows Schannel Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">C<\/p>\n<\/td>\n<td style=\"border: black 1px solid;padding-left: 5px;padding-right: 5px\">\n<p style=\"text-align: center\">ELL<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><span>Summary<\/span><\/h2>\n<p><span>As organizations look to strengthen their cyber resilience, they should integrate <a href=\"https:\/\/www.n-able.com\/solutions\/patch-management\/third-party-applications\" target=\"_blank\" rel=\"noopener\">third-party patching<\/a> priorities into their existing\u00a0<a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\">patch management routines<\/a>, ensuring that traditionally Microsoft-focused processes expand to address the multi-vendor threat landscape that characterizes modern environments. The convergence of Actively Exploited vulnerabilities across multiple platforms underscores the importance of comprehensive, risk-based patch management strategies that extend beyond severity ratings to encompass real-world exploitation patterns and business-critical system exposure.<\/span><\/p>\n<p>As always, make sure you have established patching processes for evaluation, testing, and pushing into production. If your approach has typically centered around patching based on severity alone, it&#8217;s crucial to expand your patch management strategies. Integrate priority handling into your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\">Patch Management<\/a> routines for patches related to zero-day vulnerabilities, vulnerabilities with Detected Exploitations, and those with a higher likelihood of exploitation. The convergence of Actively Exploited vulnerabilities across multiple vendors underscores the need for comprehensive, risk-based approaches that extend beyond traditional Microsoft-focused patch management to address the multi-vendor reality of modern business networks.<\/p>\n<p><strong>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\">Patch Management section of our blog<\/a>.<\/strong><\/p>\n<p><em>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<\/em><a href=\"https:\/\/twitter.com\/cybersec_nerd\"><em>@cybersec_nerd<\/em><\/a><\/p>\n<p><em>LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\">thesecuritypope<\/a><\/em><\/p>\n<p><em>Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\">cybersec_nerd<\/a>\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>June\u2019s Patch Tuesday highlights 66 vulnerabilities, including 11 critical and two zero-day vulnerabilities. Lewis Pope explores urgent risks from WebDAV exploits and Active Directory threats.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-67379","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday June 2025<\/title>\n<meta name=\"description\" content=\"Lewis Pope reviews June\u2019s Patch Tuesday, including 11 critical and 2 zero-day, plus urgent risks from WebDAV exploits and AD threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday June 2025\" \/>\n<meta property=\"og:description\" content=\"Lewis Pope reviews June\u2019s Patch Tuesday, including 11 critical and 2 zero-day, plus urgent risks from WebDAV exploits and AD threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-12T10:11:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T17:00:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_Header_V1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday June 2025: Active WebDAV Exploitation and Unpatched BadSuccessor Allows Active Directory Compromise\",\"datePublished\":\"2025-06-12T11:11:16+01:00\",\"dateModified\":\"2025-09-09T17:00:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\"},\"wordCount\":1734,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\",\"name\":\"Patch Tuesday June 2025\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2025-06-12T11:11:16+01:00\",\"dateModified\":\"2025-09-09T17:00:35+00:00\",\"description\":\"Lewis Pope reviews June\u2019s Patch Tuesday, including 11 critical and 2 zero-day, plus urgent risks from WebDAV exploits and AD threats.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday June 2025","description":"Lewis Pope reviews June\u2019s Patch Tuesday, including 11 critical and 2 zero-day, plus urgent risks from WebDAV exploits and AD threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise","og_locale":"es_ES","og_type":"article","og_title":"Patch Tuesday June 2025","og_description":"Lewis Pope reviews June\u2019s Patch Tuesday, including 11 critical and 2 zero-day, plus urgent risks from WebDAV exploits and AD threats.","og_url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-06-12T10:11:16+00:00","article_modified_time":"2025-09-09T17:00:35+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/Patch-Tuesday_Header_V1.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday June 2025: Active WebDAV Exploitation and Unpatched BadSuccessor Allows Active Directory Compromise","datePublished":"2025-06-12T11:11:16+01:00","dateModified":"2025-09-09T17:00:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise"},"wordCount":1734,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise","url":"https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise","name":"Patch Tuesday June 2025","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2025-06-12T11:11:16+01:00","dateModified":"2025-09-09T17:00:35+00:00","description":"Lewis Pope reviews June\u2019s Patch Tuesday, including 11 critical and 2 zero-day, plus urgent risks from WebDAV exploits and AD threats.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/patch-tuesday-june-2025-active-webdav-exploitation-and-unpatched-badsuccessor-allows-active-directory-compromise"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/67379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=67379"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/67379\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=67379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}