1.0 Introduction
Recently, Microsoft has released an advisory to patch multiple vulnerabilities in its products.
2.0 Impact
A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
3.0 Affected Products
Actively Exploited Zero-Day Vulnerabilities
- CVE-2025-30400: Microsoft DWM Core Library – Use-after-free flaw enabling local privilege escalation to SYSTEM.
- CVE-2025-32701: Windows Common Log File System Driver – Use-after-free flaw allowing local privilege escalation to SYSTEM.
- CVE-2025-32706: Windows Common Log File System Driver – Improper input validation enabling local privilege escalation to SYSTEM.
- CVE-2025-32709: Windows Ancillary Function Driver for WinSock – Use-after-free flaw allowing local privilege escalation to SYSTEM.
- CVE-2025-30397: Microsoft Scripting Engine – Type confusion vulnerability enabling remote code execution via malicious links in Edge or Internet Explorer.
Publicly Disclosed Zero-Day Vulnerabilities
- CVE-2025-26685: Microsoft Defender for Identity – Improper authentication allowing unauthenticated LAN-based account spoofing.
- CVE-2025-32702: Visual Studio – Command injection vulnerability enabling unauthenticated local code execution.
Critical Vulnerabilities in Azure and Power Apps
- Azure DevOps (CVE-2025-29813)
- Azure Automation (CVE-2025-29827)
- Azure Storage Resource Provider (CVE-2025-29972)
- Azure (CVE-2025-30387)
- Microsoft Power Apps (CVE-2025-47733)
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the Microsoft MSRC Security Update Guide and apply the necessary updates.
Kindly refer to the following URL: https://msrc.microsoft.com/update-guide/releaseNote/2025-May
Generally, we advise users to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 Incident Response Centre through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:3the 0 MYT
Web: https://www.mycert.org.my
5.0 References