Description
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Published: 2025-12-09
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A pointer dereference bug in Microsoft Office Excel can be triggered when an attacker supplies untrusted data to the application, allowing the attacker to execute arbitrary code on the local machine. The vulnerability arises from improper handling of memory pointers, a type of buffer overrun and dangling pointer error, which the application does not sufficiently validate before use. Successful exploitation results in full code‑execution privileges within the context of the user who opens a malicious workbook, compromising confidentiality, integrity, and availability of that system.

Affected Systems

The flaw affects several Microsoft products, notably Microsoft 365 Apps for Enterprise, Microsoft Excel 2016, Microsoft Office 2019, and all long‑term servicing channel builds such as Office LTSC 2021 and LTSC 2024 for both Windows and Mac platforms. It also includes Office Online Server deployments. Users of these productivity suites should check whether their installations contain the vendor‑issued security update or are still running a vulnerable version.

Risk and Exploitability

The CVSS score of 7.8 indicates a high‑severity vulnerability that could allow local code execution, but the EPSS score of <1% shows that the exploitation probability is very low at present. The vulnerability is not listed in the CISA KEV catalog, implying no documented widespread exploitation. Based on the description, the attack vector is likely local; a malicious user or attacker who can get a target to open a specially crafted Excel file would be sufficient to trigger the flaw. Consequently, the risk is primarily to users who process untrusted documents, and the threat escalates if the attacker can entice a system administrator or power user to open the file.

Generated by OpenCVE AI on April 20, 2026 at 15:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft Office security update that includes the fix for CVE‑2025‑62560.
  • Configure Excel and Office to enforce strict macro and content‑block policies, setting the application to disallow or validate external references in workbooks.
  • Encourage users to avoid opening or executing attachments from untrusted or unknown sources, and use email‑filtering or sandboxing to inspect spreadsheets before they reach endpoints.

Generated by OpenCVE AI on April 20, 2026 at 15:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 10 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft excel
Microsoft office
Microsoft office Long Term Servicing Channel
Microsoft office Online Server
CPEs cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*
Vendors & Products Microsoft excel
Microsoft office
Microsoft office Long Term Servicing Channel
Microsoft office Online Server

Tue, 09 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Title Microsoft Excel Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft excel 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Weaknesses CWE-126
CWE-822
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:excel_2016:*:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:ltsc:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft excel 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Excel Excel 2016 Office Office 2019 Office 2021 Office 2024 Office Long Term Servicing Channel Office Macos 2021 Office Macos 2024 Office Online Server
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-16T14:18:55.203Z

Reserved: 2025-10-15T17:11:21.220Z

Link: CVE-2025-62560

cve-icon Vulnrichment

Updated: 2025-12-09T20:13:06.556Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T18:16:01.767

Modified: 2025-12-10T15:38:22.987

Link: CVE-2025-62560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:45:10Z

Weaknesses