CISA Adds TeleMessage Vulnerability to KEV List Following Breach
CISA adds TeleMessage flaw to KEV list, urges agencies to act within 3 weeks after a breach exposed…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
Microsoft Patch Tuesday for May 2025 — Snort rules and prominent vulnerabilities

Microsoft has released its monthly security update for May of 2025 which includes 78 vulnerabilities affecting a range of products, including 11 that Microsoft marked as “critical”.
Microsoft noted five vulnerabilities that have been observed to be exploited in the wild. CVE-2025-30397 is a remote code execution vulnerability in the Microsoft Scripting Engine. There were also four elevation of privilege vulnerabilities being actively exploited, CVE-2025-32709, CVE-2025-30400, CVE-2025-32701 and CVE-2025-32706 affecting the Ancillary Function Driver for WinSock, the DWM Core Library and the Windows Common Log File System Driver.
The eleven “critical” entries consist of five remote code execution (RCE) vulnerabilities, four elevation of privilege vulnerabilities, one information disclosure vulnerability and one spoofing vulnerability. Three of the critical vulnerabilities have been marked as “Exploitation more likely”: CVE-2025-30386 –a Microsoft Office RCE vulnerability, CVE-2025-30390 –an Azure ML Compute elevation of privilege vulnerability, and CVE-2025-30398 – a Nuance PowerScribe 360 information disclosure vulnerability.
The most notable of the “critical” vulnerabilities listed affect Microsoft Office. CVE-2025-30386 is a RCE vulnerability with base CVSS 3.1 score of 8.3. To successfully exploit CVE-2025-30386, an attacker could send a victim an email, and without the victim clicking the link, viewing or interacting with the email, trigger a use-after-free scenario, allowing arbitrary code to be executed. Microsoft has assessed that the attack complexity is “Low”, and exploitation is “More likely”. Another RCE vulnerability affecting Microsoft Office, CVE-2025-30377, has a CVSS 3.1 base score of 8.4, and has been assessed an attack complexity of “Low”, but exploitation is considered “Less Likely”.
Two RCE vulnerabilities affect the Remote Desktop Client. CVE-2025-29966 and CVE-2025-29967 are both Heap-cased Buffer Overflow vulnerabilities with CVSS 3.1 base scores of 8.8 with “Low” attack complexity and exploitation “Less Likely”. An attacker controlling a Remote Desktop Server could trigger the buffer overflow in a vulnerable when a vulnerable Remote Desktop Client connects to the server.
CVE-2025-29833 is a RCE affecting the Virtual Machine Bus. This is a Time-of-check Time-of-use (TOCTOU) Race Condition which has been assessed an attack complexity of “High” and exploitation is “Less Likely”.
Talos would also like to highlight the following “important” vulnerabilities as Microsoft has determined that exploitation is “More likely”:
- CVE-2025-24063 – Kernel Streaming Service Driver Elevation of Privilege Vulnerability
- CVE-2025-29841 – Universal Print Management Service Elevation of Privilege Vulnerability
- CVE-2025-29971 – Web Threat Defense (WTD.sys) Denial of Service Vulnerability
- CVE-2025-29976 – Microsoft SharePoint Server Elevation of Privilege Vulnerability
- CVE-2025-30382 – Microsoft SharePoint Server Remote Code Execution Vulnerability
- CVE-2025-30385 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
- CVE-2025-30388 – Windows Graphics Component Remote Code Execution Vulnerability
A complete list of all the other vulnerabilities Microsoft disclosed this month is available on its update page.
In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.
The rules included in this release that protect against the exploitation of many of these vulnerabilities are 64848-64867. There are also these Snort 3 rules: 64852-64853, 301192-301200, and 301203
Cisco Talos Blog – Read More
Google’s Advanced Protection for Vulnerable Users Comes to Android
A new extra-secure mode for Android 16 will let at-risk users lock their devices down.
Security Latest – Read More
CISA Warns of TeleMessage Vuln Despite Low CVSS Score
Though the app claims to use end-to-end encryption, hackers have reportedly accessed archived data on the app’s servers via a new vulnerability.
darkreading – Read More
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Earth Ammit, as the group is known, launched two waves of campaigns from 2023 to 2024, affecting a range of industries including military, satellite, heavy industry, media, technology, software services and healthcare.
The Record from Recorded Future News – Read More
US extradites Kosovo national charged in operating illegal online marketplace
A 33-year-old Kosovo citizen, Liridon Masurica, has been extradited to the U.S. to face charges related to his alleged role in operating an illegal online marketplace.
The Record from Recorded Future News – Read More
Google announces new security features for Android for protection against scam and theft
At the Android Show on Tuesday, ahead of Google I/O, Google announced new security and privacy features for Android. These new features include new protections for calls, screen sharing, messages, device access, and system-level permissions. With these features, Google aims to protect users from falling for a scam, keep their details secure in case a […]
Security News | TechCrunch – Read More
Your Android phone is getting a huge security upgrade for free – what’s new
Google says these new security features will help keep scam calls and texts, sketchy apps, and phone thieves at bay. Here’s how.
Latest stories for ZDNET in Security – Read More
EU launches vulnerability database to tackle cybersecurity threats
The European Union launched on Tuesday its new vulnerability database to provide aggregated information regarding cybersecurity issues affecting various products and services.
The Record from Recorded Future News – Read More

