Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code

Posted on September 10, 2025September 10, 2025 By CWS

Microsoft has launched patches for 2 vital vulnerabilities in Microsoft Workplace that might enable attackers to execute malicious code on affected programs.

The issues, tracked as CVE-2025-54910 and CVE-2025-54906, have been disclosed on September 9, 2025, and have an effect on varied variations of the favored productiveness suite.

Whereas Microsoft has assessed exploitation as “much less probably” for each vulnerabilities right now, their potential for distant code execution warrants rapid consideration from customers and directors.

The vulnerabilities differ of their exploitation strategies and severity, with one being rated as Crucial and the opposite as Necessary.

Crucial Microsoft Workplace Vulnerabilities

The extra extreme of the 2 flaws, CVE-2025-54910, is a Crucial-rated heap-based buffer overflow vulnerability.

One of these weak spot, cataloged as CWE-122, can enable an unauthorized attacker to execute arbitrary code regionally on a goal machine. A very harmful side of this vulnerability is that the Preview Pane in Microsoft Workplace serves as an assault vector.

Which means an attacker might doubtlessly set off the exploit with none interplay from the person past them merely receiving and viewing a malicious file in an Explorer window.

Though the assault is executed regionally, the time period “distant” within the vulnerability’s title refers back to the attacker’s location, highlighting that they don’t want prior entry to the sufferer’s machine.

The second vulnerability, CVE-2025-54906, is rated as Necessary and stems from a Use-After-Free situation, tracked as CWE-416.

This flaw additionally permits distant code execution, however its exploitation vector differs considerably from the heap-based overflow. To take advantage of this vulnerability, an attacker should craft a malicious file and socially engineer the person into opening it.

In contrast to the opposite flaw, the Preview Pane is just not an assault vector for CVE-2025-54906, that means the person should actively have interaction with the malicious content material.

This requirement for person interplay is a key cause for its decrease severity score in comparison with the Preview Pane vulnerability.

Mitigations

Microsoft has launched safety updates to handle these vulnerabilities for many affected software program. The corporate advises prospects to use all updates supplied for the software program put in on their programs to make sure complete safety.

It ought to be famous that safety updates for Microsoft Workplace LTSC for Mac 2021 and 2024 usually are not instantly obtainable however will probably be launched shortly.

Microsoft will notify prospects via a revision to the CVE info as soon as these updates are prepared. Given the intense nature of distant code execution flaws, customers are strongly inspired to put in the patches as quickly as doable to mitigate the chance of potential exploitation.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attackers, Code, Critical, Execute, Malicious, Microsoft, Office, Vulnerabilities

Post navigation

Previous Post: HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance
Next Post: Highly Popular NPM Packages Poisoned in New Supply Chain Attack

Related Posts

New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction Cyber Security News
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Cyber Security News
Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks
  • Top 10 Best Mobile Application Penetration Testing Companies in 2025
  • Red Access Raises $17 Million for Agentless Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks
  • Top 10 Best Mobile Application Penetration Testing Companies in 2025
  • Red Access Raises $17 Million for Agentless Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News