Home » For June’s Patch Tuesday, 68 fixes — and two zero-day flaws

For June’s Patch Tuesday, 68 fixes — and two zero-day flaws

by Jamal Richaqrds
2 minutes read

June’s Patch Tuesday from Microsoft brought forth a relatively light release, featuring 68 patches for Microsoft Windows and Office. While Exchange and SQL Server remained untouched, two zero-day vulnerabilities emerged, urging immediate action for Windows and Office users. The presence of these vulnerabilities, CVE-2025-33073 and CVE-2025-33053, underscores the critical nature of this month’s patches.

To assist in navigating these updates, the Readiness team has crafted an insightful infographic shedding light on the risks associated with deploying the latest patches. This resource can be invaluable in understanding the implications of these crucial security updates.

Despite the limited known issues disclosed by Microsoft for June, specific product-focused concerns were highlighted. For instance, Excel users were advised against using square brackets in filenames, as they are not supported and may trigger errors. Additionally, Windows 10 users may encounter blurry text in certain scenarios, with recommended solutions provided by Microsoft to improve clarity.

In terms of major revisions and mitigations, Microsoft made swift corrections to CVE-2025-33073, a vulnerability in Windows SMB Client Elevation of Privilege. This quick response reflects Microsoft’s commitment to addressing critical security issues promptly, ensuring the safety of its users.

Furthermore, while there were no enforcement updates for Windows in June, it is crucial for organizations to stay vigilant and implement the latest security patches promptly. The Readiness team consistently analyzes Microsoft’s updates to provide actionable testing plans, enabling enterprises to prioritize their efforts effectively.

The update cycle this month encompasses various product families, including Browsers, Microsoft Windows, Office, Developer Tools, and Adobe updates. Notably, Microsoft delivered critical patches for Windows, addressing vulnerabilities that could lead to unauthorized code execution and privilege escalation over a network.

For Office users, critical updates focusing on memory-related and memory allocation issues were released, emphasizing the importance of immediate patching. The absence of updates for Microsoft Exchange and SQL Server this month highlights the need to focus on other critical areas of IT security.

In the realm of Developer Tools, low-level updates affecting .NET and Visual Studio were rolled out, emphasizing the importance of including these updates in standard developer release schedules. Additionally, Adobe issued an update for Acrobat, underlining the significance of maintaining third-party software security alongside Microsoft updates.

In conclusion, June’s Patch Tuesday may have appeared light at first glance, but the presence of two zero-day vulnerabilities necessitates a “Patch Now” approach for Windows and Office users. By staying informed and promptly applying these essential patches, organizations can bolster their cybersecurity posture and mitigate potential risks effectively.

You may also like