Patch Tuesday: June 2025 — Key Vulnerabilities and What to Prioritise

Microsoft Patch Tuesday: June 2025 Overview
Microsoft’s June 2025 Patch Tuesday addressed 49 vulnerabilities across a range of products, including Windows, Office, SharePoint, and Microsoft Dynamics.
Out of the 49, 4 are rated Critical, and 2 are currently under active exploitation.
Key Vulnerabilities to Note
1. CVE-2025-2197 – Windows RDP Gateway RCE
Remote Code Execution via RDP Gateway
Network exploitable; no user interaction required
Patched across multiple supported Windows Server builds
Critical due to prevalence of exposed RDP in enterprise environments
2. CVE-2025-2203 – Windows Kernel Elevation of Privilege
Exploited in the wild at time of release
Impacts Windows 10, 11, and Server 2022
Allows attackers with local access to gain SYSTEM privileges
Considered high risk for lateral movement and ransomware campaigns
3. CVE-2025-2230 – Microsoft Office Remote Code Execution
Exploitable through crafted files or email content
May be triggered via user interaction
Impacts Office 2019 and Office 365 Desktop apps
Products with Multiple Vulnerabilities
Microsoft SharePoint Server
5 vulnerabilities addressed
Includes privilege escalation and remote code execution
Likely targets for attackers looking to move laterally in corporate networks
Windows DNS Server
Multiple denial-of-service and spoofing vulnerabilities
Relevant in on-prem environments
What You Should Prioritise
Patch Immediately:
CVE-2025-2197 (RDP Gateway)
CVE-2025-2203 (Windows Kernel – active exploitation)
Prioritise if SharePoint or Office is in use:
CVE-2025-2230 (Office RCE)
SharePoint Server rollups
Strategic Notes
If your organisation separates backlog from BAU remediation, this month’s Patch Tuesday items should be handled as new, time-sensitive vulnerabilities — especially those on your Critical Vulnerabilities List.
No references to specific vulnerability scanners are needed. Prioritisation should be driven by:
Exploitability status
Exposure in your environment
Business criticality of affected services
Additional Updates
Adobe also released updates for:
Acrobat Reader
ColdFusion
Creative Cloud products
These are not widely exploited at time of writing, but still warrant attention in enterprise environments with creative or document-heavy workloads.
Final Thought
Microsoft’s June 2025 release is notable for the presence of two zero-days and critical vulnerabilities affecting widely deployed components. Ensure these are addressed in line with your normal triage practices for actively exploited threats.
Subscribe to my newsletter
Read articles from Dave Hall directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
