Skip to Content

Are You at Risk? Uncover the Impact of Microsoft’s July 2025 Security Update on Systems

Can You Protect Your Business from Critical Microsoft Security Flaws? Discover the Essential July 2025 Patch Insights

Microsoft released a major security update on July 8, 2025. This update fixes 128 vulnerabilities across Windows, Office, and other Microsoft products. One of these was a zero-day vulnerability, which means it was actively exploited or publicly known before a patch was available.

What’s Included in the Update?

Applies to: Windows 10, Windows 11, Windows Server, Microsoft Office, and more.

Cumulative Updates: Each update includes all previous fixes and new security patches. This means when you install the latest update, you get all past protections as well.

Non-Security Fixes: Some updates also correct errors or add features, not just security fixes.

Special Note for Windows Server 2012/R2

Extended Support: To keep getting updates, Windows Server 2012 and 2012 R2 need an Extended Security Updates (ESU) license. Support runs until October 2026.

Key Vulnerabilities Fixed

Below are some of the most important vulnerabilities addressed in this update. Fixing these helps keep your data and systems safe.

Microsoft SQL Server Information Disclosure (CVE-2025-49719)

Severity: Important (CVSS 7.5)

Risk: An attacker can access sensitive memory data.

Action: Update SQL Server and OLE DB Driver (version 18 or 19). Check compatibility before updating.

SPNEGO NEGOEX Remote Code Execution (CVE-2025-47981)

Severity: Critical (CVSS 9.8)

Risk: An attacker can take control of a server by sending a special message.

Affected: Windows 10 version 1607 and later. A certain security setting is on by default.

Action: Apply the update right away.

Microsoft SharePoint Remote Code Execution (CVE-2025-49701, CVE-2025-49704)

Severity: Critical/Important (CVSS 8.8)

Risk: Attackers with site owner access can run their own code on SharePoint servers.

Action: Update SharePoint and review user permissions.

Windows KDC Proxy Service Remote Code Execution (CVE-2025-49735)

Severity: Critical (CVSS 8.1)

Risk: Attackers can run code by exploiting a flaw in the Kerberos authentication system.

Affected: Servers using the KDC Proxy Protocol.

Action: Update servers and check if the protocol is in use.

Windows Connected Devices Platform Service Remote Code Execution (CVE-2025-49724)

Severity: Important (CVSS 8.8)

Risk: Attackers can run code if the Nearby Sharing feature is turned on.

Action: Update Windows. Nearby Sharing is off by default, but check your settings.

Microsoft Office and Word Remote Code Execution (CVE-2025-49695, CVE-2025-49696, CVE-2025-49697, CVE-2025-49698, CVE-2025-49702, CVE-2025-49703)

Severity: Critical (CVSS 8.4)

Risk: Attackers can run harmful code through Office and Word files.

Action: Update Office and Word applications.

Windows Hyper-V Discrete Device Assignment Remote Code Execution (CVE-2025-48822)

Severity: Critical (CVSS 8.6)

Risk: Attackers can run code on a Hyper-V system by exploiting a memory flaw.

Action: Update Hyper-V hosts.

Why These Updates Matter

  • Protects Data: Fixes stop attackers from stealing or damaging information.
  • Prevents Downtime: Updates keep systems running smoothly.
  • Reduces Risk: Each patch lowers the chance of being hacked.

What Should You Do Next?

  • Install Updates Promptly: Don’t wait. Install all available updates for Windows, Office, and server products.
  • Check Compatibility: Before updating, make sure your software and drivers will work with the new updates.
  • Review Security Settings: Turn off unused features like Nearby Sharing if not needed.
  • Monitor for News: Stay alert for any new information about these vulnerabilities.

Simple Steps to Stay Safe

  • Go to Windows Update and check for updates.
  • Install all important and recommended patches.
  • Restart your computer or server after updating.
  • Repeat this process every month.

Install updates as soon as possible. Keep your systems safe by staying up to date. If you use older servers, make sure you have the right licenses for continued support. Regular updates are the best way to protect your business and personal data from threats.