Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Posted on August 13, 2025August 13, 2025 By CWS

Microsoft launched essential safety updates, addressing three critical vulnerabilities in Microsoft Workplace that would permit attackers to execute distant code on affected programs. 

The vulnerabilities, tracked as CVE-2025-53731, CVE-2025-53740, and CVE-2025-53730, have an effect on a number of variations of Microsoft Workplace and pose important safety dangers to organizations and particular person customers worldwide.

Key Takeaways1. Vital Workplace flaws allow code execution through doc preview2. All Workplace variations 2016-2024 affected, tens of millions at risk3. Patches launched August 12 – set up instantly

Use-After-Free Flaws 

The newly disclosed vulnerabilities stem from use-after-free reminiscence corruption points, labeled beneath CWE-416 within the Widespread Weak point Enumeration database. 

Each CVE-2025-53731 and CVE-2025-53740 acquired Vital severity rankings with CVSS base scores of 8.4, whereas CVE-2025-53730, affecting Microsoft Workplace Visio, was rated as Vital with a CVSS rating of seven.8. 

These vulnerabilities share an ordinary assault sample the place unauthorized attackers can exploit reminiscence administration flaws to execute arbitrary code regionally on course programs.

The technical specs reveal regarding assault vectors, with each essential vulnerabilities that includes a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C. 

This means low assault complexity, no privileges required, and no person interplay wanted for exploitation. 

Notably alarming is that the Preview Pane serves as an assault vector for CVE-2025-53731 and CVE-2025-53740, which means customers could possibly be compromised just by previewing malicious Workplace paperwork.

The vulnerabilities have an effect on a complete vary of Microsoft Workplace merchandise, together with Microsoft Workplace 2016, Workplace 2019, Workplace LTSC 2021, Workplace LTSC 2024, and Microsoft 365 Apps for Enterprise throughout each 32-bit and 64-bit architectures. 

Mac customers are additionally in danger, with Microsoft Workplace LTSC for Mac 2021 and 2024 variations requiring instant updates. The widespread affect encompasses tens of millions of customers throughout company and client environments globally.

Safety researchers 0x140ce[LLMole], Li Shuang, and willJ with Vulnerability Analysis Institute, and researchers from Zscaler’s ThreatLabz had been credited with discovering these vulnerabilities by coordinated disclosure processes. 

Microsoft’s Safety Response Middle (MSRC) has confirmed that none of those vulnerabilities have been publicly disclosed or exploited within the wild, with exploitability assessments starting from “Exploitation Unlikely” to “Exploitation Much less Probably”.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-53731Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53740Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53730Microsoft Workplace Visio Distant Code Execution Vulnerability7.8Important

Mitigations

Microsoft has launched complete safety updates for all affected Workplace variations, with replace KB5002756 addressing the vulnerabilities in Workplace 2016 editions. 

For newer Workplace variations, updates are delivered by Click on-to-Run mechanisms, with detailed data out there by Microsoft’s official safety launch channels. 

Organizations ought to prioritize the instant deployment of those updates, given the essential nature of the vulnerabilities and the potential for exploitation of the Preview Pane.

Safety groups ought to set up complete vulnerability administration applications that stretch past conventional patch administration, incorporating risk intelligence feeds and proactive monitoring for indicators of compromise (IOCs).

Enhance your SOC and assist your crew defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Code, Execute, Microsoft, Office, Remote, Vulnerabilities

Post navigation

Previous Post: New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Next Post: Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Related Posts

Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
Brave Browser Blocks Microsoft Recall by Default Due to Privacy Concerns Cyber Security News
Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
North Korean Kimsuky Hackers Data Breach Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Passkey Login Bypassed via WebAuthn Process Manipulation
  • ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns
  • “AI-Induced Destruction” – Helpful Tools Become Accidental Weapons
  • Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
  • What Is Out-of-Bounds Read and Write Vulnerability?

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Passkey Login Bypassed via WebAuthn Process Manipulation
  • ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns
  • “AI-Induced Destruction” – Helpful Tools Become Accidental Weapons
  • Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
  • What Is Out-of-Bounds Read and Write Vulnerability?

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News