Description
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Published: 2025-12-09
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free flaw in Microsoft Office objects allows an attacker to execute arbitrary code on a device that opens a specially crafted file. The vulnerability is a memory safety error (CWE‑416). When the bug is triggered the attacker’s code runs with the privileges of the user who opens the corrupted document, potentially compromising confidential data, altering system state, or installing malware. The impact is therefore loss of confidentiality, integrity, and availability for the affected workstation.

Affected Systems

The flaw affects the Microsoft 365 Apps for Enterprise suite and all supported Microsoft Office desktop and mobile products, including Office 2016, Office 2019, Office LTSC 2021, Office LTSC 2024, the corresponding LTSC for Mac 2021 and 2024 releases, and the Office for Android application. No specific version numbers are listed in the CNA data, so any installation of these product families that has not been updated with the latest security patch is potentially vulnerable.

Risk and Exploitability

The CVSS score of 8.4 places this vulnerability in the high‑severity range, and while the EPSS score is less than 1% the existence of a public reference indicates that exploitation techniques are known. The issue is not listed in the CISA KEV catalog, suggesting that widespread exploitation has not yet been observed, but the bug can be triggered by a malicious document opened locally, making it trivial for an attacker to target unpatched users. The risk to an organization scales with the number of unsandboxed devices that may open unsolicited attachments, and the lack of an automatic update may prolong exposure.

Generated by OpenCVE AI on April 20, 2026 at 15:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Microsoft Office security update that addresses CVE‑2025‑62557; the update is available from the Microsoft Security Response Center.
  • Enable automatic updates for all Office products to ensure future CVE patches are applied as soon as they are released.
  • Restrict macro settings to disallow all macros or require explicit user permission before execution, reducing the impact of malicious documents that may otherwise use the workaround for code execution.

Generated by OpenCVE AI on April 20, 2026 at 15:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 10 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft office Long Term Servicing Channel
CPEs cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office:-:*:*:*:*:android:*:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*
Vendors & Products Microsoft office Long Term Servicing Channel

Tue, 09 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Title Microsoft Office Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft office
Microsoft office 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Weaknesses CWE-416
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*
cpe:2.3:a:microsoft:office_2016:*:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft office
Microsoft office 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Office Office 2016 Office 2019 Office 2021 Office 2024 Office Long Term Servicing Channel Office Macos 2021 Office Macos 2024
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-16T14:18:53.358Z

Reserved: 2025-10-15T17:11:21.220Z

Link: CVE-2025-62557

cve-icon Vulnrichment

Updated: 2025-12-09T20:13:36.136Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T18:16:01.127

Modified: 2025-12-10T15:41:46.367

Link: CVE-2025-62557

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:45:10Z

Weaknesses