JPCERT-AT-2025-0012
JPCERT/CC
2025-05-14
Microsoft Corporation
May 2025 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-May
According to Microsoft, among the vulnerabilities, the following vulnerability have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2025-30397
Scripting Engine Memory Corruption Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30397
CVE-2025-30400
Microsoft DWM Core Library Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30400
CVE-2025-32701
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701
CVE-2025-32706
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32706
CVE-2025-32709
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32709
Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
JPCERT/CC
2025-05-14
I. Overview
Microsoft has released May 2025 Security Updates to address the vulnerabilities in their products. Remote attackers leveraging these vulnerabilities may be able to execute arbitrary code.Microsoft Corporation
May 2025 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-May
According to Microsoft, among the vulnerabilities, the following vulnerability have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2025-30397
Scripting Engine Memory Corruption Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30397
CVE-2025-30400
Microsoft DWM Core Library Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30400
CVE-2025-32701
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701
CVE-2025-32706
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32706
CVE-2025-32709
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32709
II. Solution
Please apply the security update programs through Microsoft Update, Windows Update, etc.Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
III. References
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/