{"id":350079,"date":"2025-07-08T12:45:05","date_gmt":"2025-07-08T19:45:05","guid":{"rendered":"https:\/\/msftnewsnow.com\/?p=350079"},"modified":"2025-07-08T12:45:05","modified_gmt":"2025-07-08T19:45:05","slug":"july-2025-microsoft-patch-tuesday-vulnerabilities","status":"publish","type":"post","link":"https:\/\/msftnewsnow.com\/july-2025-microsoft-patch-tuesday-vulnerabilities\/","title":{"rendered":"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws"},"content":{"rendered":"<p>Microsoft has released its July 2025 Patch Tuesday security updates, addressing a sweeping <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/1luf1ql\/patch_tuesday_megathread_20250708\/\" target=\"_blank\" rel=\"noopener\">total of <strong>137 vulnerabilities<\/strong> across its product portfolio<\/a>. This month\u2019s Microsoft Patch Tuesday cycle is headlined by a publicly disclosed zero-day vulnerability in Microsoft SQL Server, alongside a host of critical flaws in Microsoft Office, SharePoint, and AMD processors.<\/p>\n<h2><strong>Microsoft Patch Tuesday <\/strong><strong>July 2025 <\/strong><strong>Highlights<\/strong><\/h2>\n<p><strong>Total vulnerabilities fixed<\/strong>: 137<br \/>\n<strong>Zero-days resolved<\/strong>: 1 (publicly disclosed)<br \/>\n<strong>Critical vulnerabilities<\/strong>:\u00a014 (including 10 remote code execution, 1 information disclosure, 2 AMD side channel attacks)<br \/>\n<strong>Major products affected<\/strong>: SQL Server, Office, SharePoint, Windows, AMD CPUs<\/p>\n<h3><strong>Vulnerability Breakdown<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>Category<\/th>\n<th>Number Fixed<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Elevation of Privilege<\/td>\n<td>53<\/td>\n<\/tr>\n<tr>\n<td>Security Feature Bypass<\/td>\n<td>8<\/td>\n<\/tr>\n<tr>\n<td>Remote Code Execution (RCE)<\/td>\n<td>41<\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure<\/td>\n<td>18<\/td>\n<\/tr>\n<tr>\n<td>Denial of Service<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>Spoofing<\/td>\n<td>4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Note<\/strong>: These counts do not include four Mariner and three <a href=\"https:\/\/msftnewsnow.com\/microsoft-edge-first-contentful-paint-under-300ms\/\" target=\"_blank\" rel=\"noopener\">Microsoft Edge issues patched earlier this month<\/a>.<\/p>\n<h2><strong>Zero-Day: Microsoft SQL Server Information Disclosure (CVE-2025-49719)<\/strong><\/h2>\n<p>The most urgent update this month is for a <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5058713-description-of-the-security-update-for-sql-server-2019-gdr-july-8-2025-002b1ab3-296f-4f6c-86d1-68ee829dd686\" target=\"_blank\" rel=\"noopener\">publicly disclosed zero-day in Microsoft SQL Server<\/a>. Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-49719\" target=\"_blank\" rel=\"noopener\">CVE-2025-49719<\/a>, this vulnerability allows a remote, unauthenticated attacker to access data from uninitialized memory due to improper input validation. Exploiting this flaw could let attackers extract sensitive information over a network.<\/p>\n<blockquote><p>\n  &#8220;Improper input validation in SQL Server allows an unauthorized attacker to disclose information over a network,&#8221; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49719\" target=\"_blank\" rel=\"noopener\">Microsoft explains<\/a>.\n<\/p><\/blockquote>\n<h3><strong>Mitigation<\/strong><\/h3>\n<p>Admins are urged to install the latest version of Microsoft SQL Server and update the Microsoft OLE DB Driver to version 18 or 19. The flaw was discovered by <a href=\"https:\/\/www.linkedin.com\/in\/vladimir-aleksic\/?originalSubdomain=rs\" target=\"_blank\" rel=\"noopener\">Vladimir Aleksic of Microsoft<\/a>; further disclosure details remain undisclosed.<\/p>\n<h2><strong>Critical Microsoft Office and SharePoint Vulnerabilities<\/strong><\/h2>\n<p>While only one zero-day was addressed, Microsoft also patched numerous critical remote code execution (RCE) vulnerabilities in Microsoft Office. These flaws can be triggered simply by opening a malicious document or previewing it, making them especially dangerous for end users and enterprises.<\/p>\n<ol>\n<li><strong>Affected Products<\/strong>: Microsoft Office (Word, Excel, PowerPoint), SharePoint<\/li>\n<li><strong>Notable CVEs<\/strong>: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49697\" target=\"_blank\" rel=\"noopener\">CVE-2025-49697<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49695\" target=\"_blank\" rel=\"noopener\">CVE-2025-49695<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49696\" target=\"_blank\" rel=\"noopener\">CVE-2025-49696<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49702\" target=\"_blank\" rel=\"noopener\">CVE-2025-49702<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49703\" target=\"_blank\" rel=\"noopener\">CVE-2025-49703<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49698\" target=\"_blank\" rel=\"noopener\">CVE-2025-49698<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49704\" target=\"_blank\" rel=\"noopener\">CVE-2025-49704<\/a> (SharePoint), among others.<\/li>\n<li><strong>Attack Vector<\/strong>: Documents crafted to exploit these vulnerabilities can execute code with the user\u2019s privileges.<\/li>\n<\/ol>\n<p><strong>Important Note<\/strong>: Security updates for these Office flaws are <strong>not yet available<\/strong> for Microsoft Office LTSC for Mac 2021 and 2024. Microsoft states these updates will be released soon.<\/p>\n<h2><strong>AMD Side Channel Attack Flaws<\/strong><\/h2>\n<p>Two of this month\u2019s critical vulnerabilities relate to <a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7029.html\" target=\"_blank\" rel=\"noopener\"><strong>AMD side channel attacks<\/strong><\/a>. These are based on new research into transient scheduler attacks, which can potentially leak sensitive data from affected CPUs under specific microarchitectural conditions.<\/p>\n<h3><strong>Mitigation<\/strong><\/h3>\n<p>AMD and Microsoft recommend applying all available firmware and OS updates, and following secure coding and deployment best practices.<\/p>\n<h2><strong>Other Notable Vulnerabilities<\/strong><\/h2>\n<ol>\n<li><strong>Remote Code Execution (RCE)<\/strong>: 41 vulnerabilities, including critical issues in Office, SharePoint, Hyper-V, and the Windows kernel.<\/li>\n<li><strong>Elevation of Privilege<\/strong>: 53 vulnerabilities, impacting components like the Windows kernel, drivers, and system services.<\/li>\n<li><strong>Information Disclosure<\/strong>: 18 vulnerabilities, including the SQL Server zero-day and flaws in Windows components.<\/li>\n<li><strong>Denial of Service &amp; Spoofing<\/strong>: 10 vulnerabilities combined, affecting various Windows services and protocols.<\/li>\n<\/ol>\n<h2><strong>Full List of Resolved CVEs<\/strong><\/h2>\n<p>Microsoft published a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-july-2025-patch-tuesday-fixes-one-zero-day-137-flaws\/#:~:text=Below%20is%20the%20complete%20list%20of%20resolved%20vulnerabilities%20in%20the%20July%202025%20Patch%20Tuesday%20updates.\" target=\"_blank\" rel=\"noopener\">comprehensive list of all 137 vulnerabilities<\/a> addressed in July 2025. Some of the most critical and widely impactful CVEs include:<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49719\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49719<\/strong><\/a>: SQL Server Information Disclosure (Zero-Day)<\/li>\n<li><strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49697\" target=\"_blank\" rel=\"noopener\">CVE-2025-49697<\/a><\/strong>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49695\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49695<\/strong><\/a>, <strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49696\" target=\"_blank\" rel=\"noopener\">CVE-2025-49696<\/a><\/strong>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49702\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49702<\/strong><\/a>,<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49703\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49703<\/strong><\/a>, <strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49698\" target=\"_blank\" rel=\"noopener\">CVE-2025-49698<\/a><\/strong>: Various Microsoft Office RCEs<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49704\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49704<\/strong><\/a>: SharePoint RCE<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-36357\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-36357<\/strong><\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-36350\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-36350<\/strong><\/a>: AMD Transient Scheduler Attacks<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49735\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49735<\/strong><\/a>: Windows KDC Proxy Service RCE<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-49717\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-49717<\/strong><\/a>: SQL Server RCE<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-47981\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-47981<\/strong><\/a>: Windows SPNEGO Extended Negotiation RCE<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-47980\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-47980<\/strong><\/a>: Windows Imaging Component Information Disclosure<\/li>\n<\/ul>\n<p>For the full list and technical details, refer to Microsoft\u2019s official documentation and advisories.<\/p>\n<h2><strong>Patch Tuesday Management Recommendations<\/strong><\/h2>\n<p><a href=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&w=2560&ssl=1\"><img decoding=\"async\" data-attachment-id=\"350124\" data-permalink=\"https:\/\/msftnewsnow.com\/july-2025-microsoft-patch-tuesday-vulnerabilities\/btbb2wltimt53gylszie\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"1080,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"btbb2wltimt53gylszie\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone size-full wp-image-350124\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws\" width=\"1080\" height=\"720\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 1080w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-150x100.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=216&amp;ssl=1 216w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=432&amp;ssl=1 432w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=648&amp;ssl=1 648w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/07\/btbb2wltimt53gylszie-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=864&amp;ssl=1 864w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/p>\n<h3><strong>Immediate Actions for IT Admins<\/strong><\/h3>\n<ul>\n<li>Review and deploy the July 2025 security updates as soon as possible, prioritizing critical and zero-day fixes.<\/li>\n<li>Ensure SQL Server instances are updated and OLE DB drivers are current.<\/li>\n<li>Apply Office and SharePoint patches, and monitor for Mac LTSC update availability.<\/li>\n<li>Deploy cumulative updates for Windows 10\/11 endpoints.<\/li>\n<li>Monitor vendor advisories for firmware and software updates, especially for AMD CPUs and third-party applications.<\/li>\n<\/ul>\n<h3><strong>Best Practices<\/strong><\/h3>\n<ul>\n<li>Test updates in staging environments before broad deployment.<\/li>\n<li>Review vulnerability details for potential impact on your environment.<\/li>\n<li>Educate users about the risks of opening unsolicited Office documents.<\/li>\n<li>Maintain regular backup and incident response plans.<\/li>\n<\/ul>\n<p>The July 2025 Patch Tuesday shows the ongoing importance of timely patch management, with a heavy focus on Office, SQL Server, and CPU-level vulnerabilities. With 137 flaws addressed\u2014including a publicly disclosed zero-day\u2014this update cycle is critical for organizations aiming to protect their infrastructure from evolving threats. Stay vigilant, patch promptly, and follow Microsoft and vendor guidance for a secure environment.<\/p>\n<p>If you want more details on specific vulnerabilities or need help with patch deployment, check Microsoft\u2019s official Patch Tuesday portal and your vendor\u2019s security advisories.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released its July 2025 Patch Tuesday security updates, addressing a sweeping total of 137 vulnerabilities across its product portfolio. This month\u2019s Microsoft Patch Tuesday cycle is headlined by a publicly disclosed zero-day vulnerability in Microsoft SQL Server, alongside a host of critical flaws in Microsoft Office, SharePoint, and AMD processors. Microsoft Patch Tuesday &#8230; <a title=\"July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws\" class=\"read-more\" href=\"https:\/\/msftnewsnow.com\/july-2025-microsoft-patch-tuesday-vulnerabilities\/\" aria-label=\"Read more about July 2025 Microsoft Patch Tuesday: 137 Vulnerabilities Fixed, One Zero-Day in SQL Server, Critical Office and AMD Flaws\">Read more<\/a><\/p>\n","protected":false},"author":208461344,"featured_media":350127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[24,2540],"tags":[1352,1173,829,1335,87,475,778,249,927,32,1175,1083,1188,275,1205,1213],"class_list":["post-350079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-adobe","tag-android","tag-copilot","tag-copilot-pc","tag-google","tag-linkedin","tag-microsoft","tag-microsoft-edge","tag-microsoft-office","tag-patch-tuesday","tag-powerpoint","tag-security","tag-sharepoint","tag-windows","tag-windows-10","tag-windows-11"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/avdd8ckrtwd25gzo2tnu-scaled.jpg","jetpack_shortlink":"https:\/\/wp.me\/pfgCZY-1t4r","jetpack-related-posts":[{"id":20118,"url":"https:\/\/msftnewsnow.com\/security-updates-for-office-products-july-2024\/","url_meta":{"origin":350079,"position":0},"title":"Microsoft releases critical security updates for Office products, including SharePoint Server and Outlook in July 2024 Patch Tuesday","author":"Dave W. Shanahan","date":"July 26, 2024","format":false,"excerpt":"Microsoft has issued a series of important security updates for Office products as part of the July 2024 Patch Tuesday release. These updates address several vulnerabilities across various Office applications and services, aiming to enhance the security posture of Microsoft's productivity suite.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/office.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/office.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/office.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/office.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":341923,"url":"https:\/\/msftnewsnow.com\/microsofts-may-2025-patch-tuesday-five-zero-days\/","url_meta":{"origin":350079,"position":1},"title":"Microsoft\u2019s May 2025 Patch Tuesday: Five New Zero-Days Exploited, 72 Flaws Patched: What You Need to Know","author":"Dave W. Shanahan","date":"May 14, 2025","format":false,"excerpt":"Yesterday, Microsoft released its latest Patch Tuesday security updates, addressing a total of 72 vulnerabilities across its product portfolio-including Windows, Office, Azure, and more. This month\u2019s update is especially urgent, as it patches five zero-day vulnerabilities already being exploited in the wild and two additional flaws that were publicly disclosed\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft\u2019s May 2025 Patch Tuesday: Five New Zero-Days Exploited, 72 Flaws Patched: What You Need to Know","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/05\/download-10.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":350194,"url":"https:\/\/msftnewsnow.com\/microsoft-365-pdf-export-feature-critical-flaw-fix\/","url_meta":{"origin":350079,"position":2},"title":"Microsoft 365 PDF Export Feature Vulnerability: Critical Flaw Patched","author":"Dave W. Shanahan","date":"July 9, 2025","format":false,"excerpt":"A critical security vulnerability was recently discovered and patched in the widely used Microsoft 365 PDF export feature. The flaw, classified as a Local File Inclusion (LFI) vulnerability, allowed attackers to access sensitive files stored on Microsoft 365 servers during the document-to-PDF conversion process. As noted by GBHackers, Microsoft has\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft 365 PDF Export Feature Vulnerability: Critical Flaw Patched","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":332492,"url":"https:\/\/msftnewsnow.com\/microsofts-march-2025-patch-tuesday-7-zero-days\/","url_meta":{"origin":350079,"position":3},"title":"Microsoft&#8217;s March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws","author":"Dave W. Shanahan","date":"March 12, 2025","format":false,"excerpt":"Microsoft has released its March 2025 Patch Tuesday updates, resolving a total of 57 security vulnerabilities affecting various products, including Windows, Office, Remote Desktop Services, and more. As reported by Bleeping Computer, among these vulnerabilities are seven critical zero-day flaws\u2014six of which were actively exploited in the wild prior to\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft's March 2025 Patch Tuesday Addresses 57 Vulnerabilities, Including 7 Critical Zero-Day Flaws, CVE-2025-24983, CVE-2025-24991, CVE-2025-24984, CVE-2025-26630, CVE-2025-24985, CVE-2025-24993, CVE-2025-26633, CVE-2025-25001, CVE-2025-25002, CVE-2025-25003, CVE-2025-25004, CVE-2025-25005","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/f573b6ca-d63d-40aa-b938-eca52a0cc389-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":329309,"url":"https:\/\/msftnewsnow.com\/microsoft-issues-largest-security-update-in-years\/","url_meta":{"origin":350079,"position":4},"title":"Microsoft issues largest security update in years for Patch Tuesday January 2025, patches 3 critical zero-day vulnerabilities","author":"Dave W. Shanahan","date":"January 15, 2025","format":false,"excerpt":"Microsoft has released its first Patch Tuesday update of 2025, addressing a staggering 161 security vulnerabilities - the largest number of fixes in a single month since 2017. As reported by Bleeping Computer, the massive update includes security patches for three actively exploited zero-day flaws and multiple critical vulnerabilities that\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft issues January 2025 largest security updates in years, patches 3 critical zero-day vulnerabilities for January 2025","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/01\/mvz7aywqxsgp9jdu7liv-e1736965366518.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":347001,"url":"https:\/\/msftnewsnow.com\/microsoft-patch-tuesday-june-2025-65-security-fix\/","url_meta":{"origin":350079,"position":5},"title":"Microsoft Patch Tuesday June 2025: 65+ Security Vulnerabilities Patched, Zero-Day Exploit Fixed","author":"Dave W. Shanahan","date":"June 11, 2025","format":false,"excerpt":"Microsoft\u2019s June 2025 Patch Tuesday has arrived, delivering urgent security fixes for a broad range of its products. The company addressed more than 65 vulnerabilities, including a zero-day exploit that was being actively used in cyber espionage campaigns. This month\u2019s updates are critical for both enterprise and individual users, reinforcing\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft Patch Tuesday June 2025: 65+ Security Vulnerabilities Patched, Zero-Day Exploit Fixed","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/xelmjbjubehnaogdqaxe-scaled.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/350079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/users\/208461344"}],"replies":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/comments?post=350079"}],"version-history":[{"count":0,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/350079\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media\/350127"}],"wp:attachment":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media?parent=350079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/categories?post=350079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/tags?post=350079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}