Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network

Posted on May 13, 2025May 14, 2025 By CWS

Microsoft has disclosed a vital reminiscence corruption vulnerability in its Scripting Engine (CVE-2025-30397), which permits unauthorized attackers to execute code remotely over a community.

The flaw, categorized as “Essential” and tracked underneath CWE-843 (Sort Confusion), was launched as a part of the corporate’s Could 2025 Patch Tuesday safety updates.

The vulnerability arises from the Scripting Engine’s improper entry of assets utilizing incompatible sorts, resulting in a kind confusion situation.

This reminiscence corruption concern may be exploited when a consumer interacts with a specifically crafted URL, particularly whereas utilizing Microsoft Edge in Web Explorer Mode. Regardless of the excessive assault complexity, profitable exploitation may lead to full system compromise, impacting the confidentiality, integrity, and availability of affected Home windows techniques.

Exploitability and Impression

To use CVE-2025-30397, an attacker should entice a consumer to click on on a specifically crafted URL. As soon as the consumer interacts with the hyperlink in Edge’s Web Explorer Mode, the attacker can set off the vulnerability, enabling distant code execution on the sufferer’s system.

Which means even techniques in a roundabout way working Web Explorer stay in danger as a result of underlying MSHTML platform, which remains to be energetic in lots of Home windows environments.

Whereas the vulnerability was not publicly disclosed previous to the patch, Microsoft and impartial safety researchers have confirmed that it has been exploited within the wild. Exploitation has been detected, although it requires a number of situations to be met, together with consumer interplay and a particular browser configuration.

CVE-2025-30397 is among the most extreme vulnerabilities addressed within the Could 2025 Patch Tuesday, which mounted a complete of 72 flaws, together with 5 zero-days and 28 distant code execution vulnerabilities.

The Scripting Engine vulnerability stands out as a result of its potential to permit attackers to totally compromise focused techniques remotely.

Mitigations

Microsoft has launched patches addressing this vulnerability for all supported variations of Home windows. Customers and directors are strongly urged to use the newest safety updates instantly to mitigate the chance of exploitation.

Organizations must also overview browser configurations and contemplate disabling Web Explorer Mode the place doable to cut back publicity.

The invention and exploitation of CVE-2025-30397 underscore the continued dangers posed by legacy parts inside fashionable software program environments. Immediate patching and consumer consciousness stay vital defenses in opposition to refined network-based assaults leveraging such vulnerabilities.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Code, Enables, Engine, Execution, Microsoft, Network, Remote, Scripting, Vulnerability

Post navigation

Previous Post: Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild
Next Post: Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges

Related Posts

Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News
Notepad++ Vulnerability Let Attacker Gains Complete System Control Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
Microsoft Zero Day Quest Hacking Contest Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News