Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’

Posted on June 10, 2025June 10, 2025 By CWS

Microsoft on Tuesday pushed out patches for not less than 66 safety defects throughout the Home windows ecosystem and referred to as pressing consideration to a WeBDAV distant code execution bug that’s already been exploited within the wild.

The WeBDAV (Net Distributed Authoring and Versioning) flaw, marked as ‘necessary’ with a CVSS rating of 8.8/10, permits browser-based drive-by downloads if a goal clicks on a rigged web site.

“Exterior management of file title or path in WebDAV permits an unauthorized attacker to execute code over a community,” Microsoft stated in a barebones bulletin.

As is customary, Redmond has not disclosed who’s abusing the CVE-2025-33053 software program defect or whether or not exploitation is  widespread. The corporate has not offered IOCs (indicators of compromise) or different telemetry to assist defenders hunt for indicators of infections.

Examine Level Software program, the corporate credited with reporting the bug, launched a separate advisory warning that profitable exploitation may enable a distant attacker to execute arbitrary code on the affected system. 

Examine Level has linked the in-the-wild exploitation to an APT group referred to as ‘Stealth Falcon’ that makes use of spear-phishing to focus on organizations in Turkey, Qatar, Egypt and Yemen. Stealth Falcon has been publicly attributed to the United Arab Emirates (UAE).

Each corporations warn that the assault floor is gigantic with each supported model of Home windows listed as weak, from older Server 2008 builds proper as much as Home windows 11 24H2 and the forthcoming Server 2025 releases. 

As a result of WebDAV depends on the legacy MSHTML and EdgeHTML rendering engines, Microsoft can also be pushing fixes via the Web Explorer cumulative replace channel for older server platforms, making certain the underlying scripting parts are patched alongside the core WebDAV code.Commercial. Scroll to proceed studying.

The exploited WeBDAV zero-day headlines a whopper Patch Tuesday that gives cowl for not less than 9 critical-severity Home windows flaws with distant code execution danger.

In response to Redmond’s safety response group, the important bugs had been patched in Microsoft Sharepoint Server (CVE-2025-47172), Microsoft Workplace, Home windows Netlogon (CVE-2025-47167), Home windows KDC Proxy Service (CVE-2025-33071), Home windows Distant Desktop Providers (CVE-2025-32710), and Home windows Schannel (CVE-2025-29828).

The software program big additionally flagged CVE-2025-3052 for fast consideration, warning {that a}  vulnerability in a UEFI utility signed with a widely-trusted Microsoft third-party UEFI certificates might be exploited to bypass Safe Boot protections.

The InsydeH2O Safe Boot Bypass, reported by Binarly by way of CERT/CC, impacts any machine that trusts Microsoft’s “UEFI CA 2011” digital signature, a listing that features most trendy laptops, servers and workstations as a result of the identical certificates additionally indicators the Linux “shim” loader utilized by main distributions. 

Binarly stated it first observed the module on the VirusTotal malware-scanning service in November 2024; embedded signature metadata reveals it was compiled and signed in October 2022, so it has doubtless been circulating un-detected for years.

Associated: 5 Zero-Days, 15 Misconfigurations Present in Salesforce Business Cloud

Associated: Misconfigured HMIs Expose US Water Methods to Anybody With a Browser

Associated: Zero-Day Assaults Spotlight One other Busy Microsoft Patch Tuesday

Associated: Microsoft Patches 125 Home windows Vulns, Together with Exploited CLFS Zero-Day

Security Week News Tags:Covers, Exploited, Flaw, Marked, Microsoft, Patch, Tuesday, WebDAV

Post navigation

Previous Post: Microsoft Patch Tuesday June 2025
Next Post: Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

Related Posts

Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News
German Authorities Take Down Crypto Swapping Service eXch Security Week News
Zip Security Raises $13.5 Million in Series A Funding Security Week News
Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Security Week News
Booz Allen Invests in Machine Identity Firm Corsha Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Aanchal Gupta Joins Adobe as Chief Security Officer
  • Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
  • GitHub Outage Disrupts Core Services Globally for Users
  • CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation
  • Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Aanchal Gupta Joins Adobe as Chief Security Officer
  • Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control
  • GitHub Outage Disrupts Core Services Globally for Users
  • CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation
  • Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News