June’s Patch Tuesday: Microsoft Fixes Only Two Zero-Days, But One’s Already Being Exploited

Listen to this Post

Featured Image
Cybersecurity in June: A Brief Calm Before the Storm?
While many system administrators might be breathing a slight sigh of relief this June, the quiet isn’t without its caveats. Microsoft’s latest Patch Tuesday is notably lighter than usual, addressing 66 vulnerabilities in total — including only two classified as zero-days. Yet, despite the low number, the stakes remain high. One of these zero-day flaws is already being exploited in the wild, posing a real and present threat. As businesses rely heavily on legacy protocols like WebDAV and SMB, any vulnerability that targets them can have far-reaching consequences. So while the number of threats might be low this month, the urgency behind patching them remains as strong as ever.

Key Takeaways from June’s Patch Tuesday

This June, Microsoft delivered a relatively small batch of patches, especially when compared to previous months. Among the 66 CVEs fixed, only two are classified as zero-day vulnerabilities. However, one of them, CVE-2024-33053, has already been exploited in the wild. This remote code execution (RCE) vulnerability affects the Web Distributed Authoring and Versioning (WebDAV) HTTP extension and is considered “important” by Microsoft, carrying a CVSS score of 8.8. The flaw arises from improper handling of file commands like PUT and MOVE, allowing attackers to execute malicious code remotely, often with elevated privileges. Although WebDAV is not enabled by default, its use in many older or specialized enterprise systems makes this vulnerability particularly dangerous.

The exploitation method involves uploading a file using a PUT request, then renaming it with a semicolon-injected filename via the MOVE command, followed by triggering execution through a carefully crafted URL. This method bypasses standard security measures and represents a real concern for legacy systems that still rely on WebDAV for file sharing or document management. According to experts, even if WebDAV isn’t widely used today, its presence in older infrastructure means this bug cannot be ignored.

The second zero-day, CVE-2025-33073, though not yet exploited, is also rated “important” and carries the same CVSS score of 8.8. It’s an elevation of privilege (EoP) vulnerability within the Windows Server Message Block (SMB) client. Once an attacker breaches a system — commonly through phishing or another vulnerability — they can exploit this flaw to gain higher-level access. This might allow them to disable defenses, steal data, install malware, or spread through the network. Given how crucial SMB is for internal Windows networking, patching this flaw should be a high priority for system administrators.

Overall, June may be light in numbers, but not in severity. With 10 remote code execution flaws fixed among the total 66 CVEs, administrators are advised to act swiftly and patch systems before these issues escalate further.

What Undercode Say:

Microsoft’s June patch cycle may appear uneventful at first glance, but the presence of a zero-day vulnerability that’s already being exploited paints a different picture. CVE-2024-33053’s focus on WebDAV—a feature many consider legacy—highlights an ongoing issue in cybersecurity: the vulnerabilities hidden in outdated, undermaintained systems that still power critical enterprise functions. Despite WebDAV not being active by default, its residual use in numerous organizations makes this bug particularly insidious.

The real problem lies in how underestimated legacy components are. As modern systems evolve, many organizations retain older services for compatibility reasons. These systems often fly under the radar, with minimal updates or scrutiny, making them ideal entry points for attackers. The WebDAV bug’s exploitation method, which creatively abuses PUT and MOVE commands to bypass protections, demonstrates how attackers continue to evolve their tactics based on subtle misconfigurations.

Security engineers like Seth Hoyt have rightly pointed out that visibility is key. Knowing where services like WebDAV are active, and ensuring they are properly configured—or disabled if unused—can dramatically reduce exposure. However, the reality is that many enterprises lack a full map of what’s running on their networks. This lack of visibility translates to blind spots where such vulnerabilities thrive.

CVE-2025-33073, the SMB elevation of privilege vulnerability, represents another layer of concern. SMB is a cornerstone of Windows networking, and privilege escalation flaws are especially prized by cybercriminals. The post-breach environment, where attackers try to elevate their privileges after getting a foot in the door, makes these vulnerabilities highly valuable in chained exploits. In practice, these can be used to disable antivirus tools, dump credentials, or enable lateral movement across the network.

The limited number of fixes this month—just 66—might lull some teams into a false sense of security. But with 10 of those being RCEs, there’s no justification for complacency. It’s a classic case of quality over quantity. The fact that one zero-day is being actively exploited indicates that attackers are not resting, even if the patch count is low. Smaller patch loads can sometimes lead to delayed responses, especially when security teams are understaffed or overburdened with routine tasks.

Another subtle yet critical takeaway is the changing definition of “zero-day.” Microsoft categorizes flaws that are publicly disclosed but not yet exploited as zero-days. This broader definition acknowledges the speed at which public information can be weaponized. In the case of CVE-2025-33073, now is the time to act before it transitions from disclosed to exploited.

System administrators and security teams must take this month’s patch seriously. Even in a light cycle, the impact of a single overlooked flaw can be catastrophic. In today’s hybrid infrastructures—where old meets new—security hygiene must include both proactive updates and rigorous inventory management.

Fact Checker Results:

✅ CVE-2024-33053 is confirmed exploited in the wild

✅ WebDAV is not enabled by default but still widely used in legacy systems

✅ CVE-2025-33073 remains unexploited but is publicly disclosed

Prediction:

If trends hold, next month’s Patch Tuesday may increase in volume, especially if Microsoft has delayed certain disclosures. Given the severity of WebDAV exploitation, we can expect a spike in attempts targeting legacy file-sharing systems, particularly in industries slow to update. Attackers will likely continue leveraging privilege escalation bugs in SMB to extend their reach post-breach. Legacy infrastructure remains the soft underbelly of enterprise security, and it’s only a matter of time before more vulnerabilities surface in similarly overlooked systems. 🔐📉🛠️

References:

Reported By: www.infosecurity-magazine.com
Extra Source Hub:
https://www.pinterest.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram