Important Notice: Security vulnerabilities of Microsoft (updated at 11 June 2026)
關於 Microsoft 的安全漏洞通告 (更新於 2025年6月11日)

資訊安全警示 Information Security Alert
To: All Users
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft have recently released its June security update notice, there are 69 vulnerability updates this time.
The updates this time mainly cover the following components: .NET and Visual Studio, Windows Common Log File System Driver, Windows Cryptographic Services, Windows DHCP Server, Windows KDC Proxy Service (KPSSVC), Windows DWM Core Library, Windows Local Security Authority Subsystem Service (LSASS) products vulnerabilities.
Details of the vulnerabilities:
- Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
- Windows SMB Client Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33073
- Microsoft Office Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47167
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47164
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47953
- Windows Netlogon Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33070
- Windows Common Log File System Driver Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701
- Microsoft SharePoint Server Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47172
- Windows Remote Desktop Services Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32710
- Windows Common Log File System Driver Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32713
For more details about Microsoft June Updates, please refer to: https://msrc.microsoft.com/update-guide/releaseNote/2025-Jun
If the relevant affected products are used, please install the security updates released by Microsoft as soon as possible.
Reference
- How to download and install software in a secure manner?
- Basic Knowledge of Online Safety and Security
- Other Information Security Tips
Should you have any enquiries, please feel free to contact ICTO Help Desk.
ICTO Help Desk
Location : Room 2085, 2/F, Central Teaching Building (E5), eMap
Telephone : 8822 8600
email : icto.helpdesk@um.edu.mo
Information and Communication Technology Office
各位用戶:
資訊及通訊科技部接獲網絡安全事故預警及應急中心的通知,Microsoft 近日發布了 6月安全更新通告,此次包含了 69個漏洞更新。
此次釋出的更新主要涵蓋了以下組件: .NET and Visual Studio, Windows Common Log File System Driver, Windows Cryptographic Services, Windows DHCP Server, Windows KDC Proxy Service (KPSSVC), Windows DWM Core Library, Windows Local Security Authority Subsystem Service (LSASS) 等產品的漏洞。
漏洞詳情:
- Web 分散式創作和版本控制(WEBDAV)遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
- Windows SMB 用戶端特權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33073
- Microsoft Office 遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47167
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47164
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47953
- Windows Netlogon 許可權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33070
- Windows KDC 代理服務 (KPSSVC) 遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701
- Microsoft SharePoint Server 遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47172
- Windows 遠端桌面服務遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32710
- Windows 通用日誌檔案系統驅動程式許可權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32713
Microsoft 6月更新有關詳情可參考:https://msrc.microsoft.com/update-guide/releaseNote/2025-Jun
倘有使用相關受影響產品,須盡快安裝由微軟公司釋出的安全更新。
參考資料
如有任何疑問,請聯絡資訊及通訊科技部服務中心。
服 務 中 心
位置 : 中央教學樓東5座(E5)二樓2085室 (電子地圖)
電話 : 8822 8600
電郵 : icto.helpdesk@um.edu.mo
資訊及通訊科技部