# Microsoft Patch Tuesday Security Updates for May 2025: A Look into the Latest Zero-Day Exploits
**The Patch Ahead**
Microsoft's monthly Patch Tuesday security updates for May 2025 are now available, addressing a total of 75 security flaws across various products. Among these, a notable five zero-day vulnerabilities have been actively exploited in the wild. In this article, we'll delve into the details of each exploit and explore the measures Microsoft has taken to protect its users.
**The Scope of the Patch**
Microsoft's latest patch addresses 75 security vulnerabilities in Windows and Windows Components, Office and Office Components, .NET and Visual Studio, Azure, Nuance PowerScribe, Remote Desktop Gateway Service, and Microsoft Defender. The severity of these flaws ranges from Critical to Important, with 12 being rated Critical.
**Zero-Day Exploits on the Rise**
According to ZDI, a research firm that tracks vulnerabilities, five zero-day vulnerabilities have been exploited in the wild. These exploits are:
* **CVE-2025-30397: Scripting Engine Memory Corruption Vulnerability**: Attackers can exploit a remote code execution bug in Edge by tricking victims into clicking a crafted link. The bug forces Edge to switch into Internet Explorer mode, allowing attackers to execute malicious code. * **CVE-2025-32701/CVE-2025-32706: Windows Common Log File System Driver Elevation of Privilege Vulnerability**: Recent Windows component bugs, previously exploited, enable SYSTEM-level privilege escalation and may support ransomware attacks. This vulnerability allows attackers to escalate privileges to SYSTEM, potentially leading to severe consequences. * **CVE-2025-32709: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability**: The researchers observed that this component was exploited again after February, raising concerns about patch quality. An attacker can exploit this flaw to achieve privilege escalation to SYSTEM. * **CVE-2025-30400: Microsoft DWM Core Library Elevation of Privilege Vulnerability**: This recently exploited privilege escalation bug allows SYSTEM-level code execution and may be used in phishing/ransomware attacks.
**A Word from the Experts**
The researchers behind these vulnerabilities emphasize the importance of timely patching. By applying these patches, users can significantly reduce the risk of exploitation.
Stay informed about the latest security updates and threats by following us on Twitter (@securityaffairs), Facebook, and Mastodon (SecurityAffairs – hacking, Microsoft Patch Tuesday).