Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Posted on August 13, 2025August 13, 2025 By CWS

Microsoft launched essential safety updates, addressing three critical vulnerabilities in Microsoft Workplace that would permit attackers to execute distant code on affected programs. 

The vulnerabilities, tracked as CVE-2025-53731, CVE-2025-53740, and CVE-2025-53730, have an effect on a number of variations of Microsoft Workplace and pose important safety dangers to organizations and particular person customers worldwide.

Key Takeaways1. Vital Workplace flaws allow code execution through doc preview2. All Workplace variations 2016-2024 affected, tens of millions at risk3. Patches launched August 12 – set up instantly

Use-After-Free Flaws 

The newly disclosed vulnerabilities stem from use-after-free reminiscence corruption points, labeled beneath CWE-416 within the Widespread Weak point Enumeration database. 

Each CVE-2025-53731 and CVE-2025-53740 acquired Vital severity rankings with CVSS base scores of 8.4, whereas CVE-2025-53730, affecting Microsoft Workplace Visio, was rated as Vital with a CVSS rating of seven.8. 

These vulnerabilities share an ordinary assault sample the place unauthorized attackers can exploit reminiscence administration flaws to execute arbitrary code regionally on course programs.

The technical specs reveal regarding assault vectors, with each essential vulnerabilities that includes a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C. 

This means low assault complexity, no privileges required, and no person interplay wanted for exploitation. 

Notably alarming is that the Preview Pane serves as an assault vector for CVE-2025-53731 and CVE-2025-53740, which means customers could possibly be compromised just by previewing malicious Workplace paperwork.

The vulnerabilities have an effect on a complete vary of Microsoft Workplace merchandise, together with Microsoft Workplace 2016, Workplace 2019, Workplace LTSC 2021, Workplace LTSC 2024, and Microsoft 365 Apps for Enterprise throughout each 32-bit and 64-bit architectures. 

Mac customers are additionally in danger, with Microsoft Workplace LTSC for Mac 2021 and 2024 variations requiring instant updates. The widespread affect encompasses tens of millions of customers throughout company and client environments globally.

Safety researchers 0x140ce[LLMole], Li Shuang, and willJ with Vulnerability Analysis Institute, and researchers from Zscaler’s ThreatLabz had been credited with discovering these vulnerabilities by coordinated disclosure processes. 

Microsoft’s Safety Response Middle (MSRC) has confirmed that none of those vulnerabilities have been publicly disclosed or exploited within the wild, with exploitability assessments starting from “Exploitation Unlikely” to “Exploitation Much less Probably”.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-53731Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53740Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53730Microsoft Workplace Visio Distant Code Execution Vulnerability7.8Important

Mitigations

Microsoft has launched complete safety updates for all affected Workplace variations, with replace KB5002756 addressing the vulnerabilities in Workplace 2016 editions. 

For newer Workplace variations, updates are delivered by Click on-to-Run mechanisms, with detailed data out there by Microsoft’s official safety launch channels. 

Organizations ought to prioritize the instant deployment of those updates, given the essential nature of the vulnerabilities and the potential for exploitation of the Preview Pane.

Safety groups ought to set up complete vulnerability administration applications that stretch past conventional patch administration, incorporating risk intelligence feeds and proactive monitoring for indicators of compromise (IOCs).

Enhance your SOC and assist your crew defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Code, Execute, Microsoft, Office, Remote, Vulnerabilities

Post navigation

Previous Post: New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Next Post: Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Related Posts

Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report Cyber Security News
MCPTotal Launches to Power Secure Enterprise MCP Workflows MCPTotal Launches to Power Secure Enterprise MCP Workflows Cyber Security News
Windows 11 Update KB5077181 Triggers Endless Reboot Issues Windows 11 Update KB5077181 Triggers Endless Reboot Issues Cyber Security News
Linux Kernel Patching: Preventing Exploits in 2025 Linux Kernel Patching: Preventing Exploits in 2025 Cyber Security News
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Cyber Security News
CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark