CVE-2025-27729 Windows Shell Remote Code Execution Vulnerability
Updated acknowledgment. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729
Updated acknowledgment. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729
Chromium: CVE-2025-3619 Heap buffer overflow in Codecs
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3619
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3619
Chromium: CVE-2025-3620 Use after free in USB
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3620
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3620
CVE-2025-25000 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Corrected Build Number in the Security Updates table. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000
Corrected Build Number in the Security Updates table. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000
CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability
Added an acknowledgement. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
Added an acknowledgement. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
CVE-2025-21199 Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
Updated acknowledgment. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21199
Updated acknowledgment. This is an informational change only.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21199
CVE-2025-21416 Azure Virtual Desktop Elevation of Privilege Vulnerability
Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21416
Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21416
CVE-2025-30392 Azure AI bot Elevation of Privilege Vulnerability
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30392
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30392
CVE-2025-30390 Azure ML Compute Elevation of Privilege Vulnerability
Improper authorization in Azure allows an authorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30390
Improper authorization in Azure allows an authorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30390
CVE-2025-33074 Azure Functions Remote Code Execution Vulnerability
Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33074
Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33074
CVE-2025-30389 Azure Bot Framework SDK Elevation of Privilege Vulnerability
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30389
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30389
CVE-2025-30391 Microsoft Dynamics Information Disclosure Vulnerability
Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30391
Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30391
CVE-2025-47732 Microsoft Dataverse Remote Code Execution Vulnerability
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732
CVE-2025-47733 Microsoft Power Apps Information Disclosure Vulnerability
Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733
Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733
CVE-2025-29813 Azure DevOps Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one.The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813
An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one.The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813
CVE-2025-29827 Azure Automation Elevation of Privilege Vulnerability
Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827
Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827
CVE-2025-29972 Azure Storage Resource Provider Spoofing Vulnerability
Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972
Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972
CVE-2025-33072 Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability
Improper access control in Azure allows an unauthorized attacker to disclose information over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072
Improper access control in Azure allows an unauthorized attacker to disclose information over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072
Chromium: CVE-2025-4372 Use after free in WebAudio
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4372
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4372
CVE-2024-49128 Windows Remote Desktop Services Remote Code Execution Vulnerability
To comprehensively address CVE-2024-49128, Microsoft has released May 2025 security updates for all affected versions of Windows Server. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49128
To comprehensively address CVE-2024-49128, Microsoft has released May 2025 security updates for all affected versions of Windows Server. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49128
Chromium: CVE-2025-4664 Insufficient policy enforcement in Loader
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information. Google is aware of reports that an exploit for CVE-2025-4664 exists in the wild.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4664
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information. Google is aware of reports that an exploit for CVE-2025-4664 exists in the wild.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4664