May 2025 Patch Tuesday: Five Zero-Days Exploited and a Spike in Office Vulnerabilities
May 2025 Patch Tuesday: Zero-Days, RCEs, and a Rising Office Threat Landscape
May 2025âs Patch Tuesday: Why It Matters
May 2025âs Patch Tuesday is grabbing attentionâfor reasons both reassuring and alarming. Microsoft has rolled out patches for 72 vulnerabilities, including:
- 5 zero-days currently exploited in the wild
- 6 critical flaws, most enabling remote code execution (RCE)
Notably, this month revealed a spike in Office-related vulnerabilities, underscoring an evolving trend: attackers are shifting focus toward Microsoft 365 environments.
Whatâs New in May 2025 Patch Tuesday?
On May 13, Microsoft released patches across its ecosystem:
- Windows
- Office
- Azure
- Visual Studio
- Microsoft Defender
đ´ Five of the patched vulnerabilities were actively exploited, and two more had been publicly disclosed prior to patch availability.
âĄď¸ See full details on:
Breakdown of May 2025 Vulnerabilities
- 17 Elevation of Privilege
- 2 Security Feature Bypass
- 28 Remote Code Execution
- 15 Information Disclosure
- 7 Denial of Service
- 2 Spoofing
Five Actively Exploited Zero-Days
One of the standout zero-days is CVE-2025-30397âa scripting engine memory corruption flaw enabling remote code execution via malicious links.
This vulnerability can force Microsoft Edge into Internet Explorer mode, revealing the persistent risks of legacy components.
Other zero-days include:
- Windows privilege escalation vulnerabilities
- A flaw in the Windows Ancillary Function Driver for Winsock: CVE-2025-32709
đ Read more on:
Office Vulnerabilities: A Growing Threat
This month saw an unusual surge in Microsoft Office vulnerabilities.
Microsoft patched critical issues in:
- Word
- Excel
- PowerPoint
- Outlook
- SharePoint Server
Two RCE bugs stood out:
These can be exploited simply by opening a malicious document, signaling a strategic shift by attackers toward document-based threats aimed at Microsoft 365 users.
đĄ More on this trend from:
Why This Matters for Microsoft 365 Users
- â ď¸ Zero-days are being exploited before patches are releasedâreaction time matters.
- đ Office vulnerabilities are rising, especially in document-based attacks.
- đ§ą Legacy components still lurk within modern systems, broadening the attack surface.
- đ§ MSPs need streamlined tools to stay ahead of risk.
What Should You Do Now?
â Patch Immediately
Deploy May 2025 updates across all systemsâespecially Microsoft 365 Apps and Office 2019.
đ§ Harden Application Settings
Block Office child processes, disable macros, and use Group Policy Objects (GPOs) to restrict risky behaviors.
đ Monitor Exploit Chains
Watch for CVE combinations used in ransomware attacks, often involving elevation of privilege.
đ§ Educate End Users
Train users to avoid clicking unknown links or opening suspicious documentsâeven from familiar senders.
Let Optimize365 Help You Stay Secure at Scale
Optimize365: Microsoft 365 SecurityâSimplified
Donât just patchâproactively protect.
Optimize365.io is built for MSPs and MSSPs who need to simplify and automate Microsoft 365 security management.
Our Offering:
- đ Streamlined Client Onboarding
- đ Security Baseline Enforcement and User Impact Prediction
- â ď¸ Drift Detection & Remediation
- đ Revenue Opportunity Identification
Our platform:
- Cuts down manual work
- Increases client security
- Gives you scalable control over all your clientsâ Microsoft 365 environments
đ Start your journey with Optimize365 â and make security a strategic advantage, not a burden.
Stay ahead of the threats. Patch fast. Automate faster.