Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Posted on August 13, 2025August 13, 2025 By CWS

Microsoft launched essential safety updates, addressing three critical vulnerabilities in Microsoft Workplace that would permit attackers to execute distant code on affected programs. 

The vulnerabilities, tracked as CVE-2025-53731, CVE-2025-53740, and CVE-2025-53730, have an effect on a number of variations of Microsoft Workplace and pose important safety dangers to organizations and particular person customers worldwide.

Key Takeaways1. Vital Workplace flaws allow code execution through doc preview2. All Workplace variations 2016-2024 affected, tens of millions at risk3. Patches launched August 12 – set up instantly

Use-After-Free Flaws 

The newly disclosed vulnerabilities stem from use-after-free reminiscence corruption points, labeled beneath CWE-416 within the Widespread Weak point Enumeration database. 

Each CVE-2025-53731 and CVE-2025-53740 acquired Vital severity rankings with CVSS base scores of 8.4, whereas CVE-2025-53730, affecting Microsoft Workplace Visio, was rated as Vital with a CVSS rating of seven.8. 

These vulnerabilities share an ordinary assault sample the place unauthorized attackers can exploit reminiscence administration flaws to execute arbitrary code regionally on course programs.

The technical specs reveal regarding assault vectors, with each essential vulnerabilities that includes a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C. 

This means low assault complexity, no privileges required, and no person interplay wanted for exploitation. 

Notably alarming is that the Preview Pane serves as an assault vector for CVE-2025-53731 and CVE-2025-53740, which means customers could possibly be compromised just by previewing malicious Workplace paperwork.

The vulnerabilities have an effect on a complete vary of Microsoft Workplace merchandise, together with Microsoft Workplace 2016, Workplace 2019, Workplace LTSC 2021, Workplace LTSC 2024, and Microsoft 365 Apps for Enterprise throughout each 32-bit and 64-bit architectures. 

Mac customers are additionally in danger, with Microsoft Workplace LTSC for Mac 2021 and 2024 variations requiring instant updates. The widespread affect encompasses tens of millions of customers throughout company and client environments globally.

Safety researchers 0x140ce[LLMole], Li Shuang, and willJ with Vulnerability Analysis Institute, and researchers from Zscaler’s ThreatLabz had been credited with discovering these vulnerabilities by coordinated disclosure processes. 

Microsoft’s Safety Response Middle (MSRC) has confirmed that none of those vulnerabilities have been publicly disclosed or exploited within the wild, with exploitability assessments starting from “Exploitation Unlikely” to “Exploitation Much less Probably”.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-53731Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53740Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53730Microsoft Workplace Visio Distant Code Execution Vulnerability7.8Important

Mitigations

Microsoft has launched complete safety updates for all affected Workplace variations, with replace KB5002756 addressing the vulnerabilities in Workplace 2016 editions. 

For newer Workplace variations, updates are delivered by Click on-to-Run mechanisms, with detailed data out there by Microsoft’s official safety launch channels. 

Organizations ought to prioritize the instant deployment of those updates, given the essential nature of the vulnerabilities and the potential for exploitation of the Preview Pane.

Safety groups ought to set up complete vulnerability administration applications that stretch past conventional patch administration, incorporating risk intelligence feeds and proactive monitoring for indicators of compromise (IOCs).

Enhance your SOC and assist your crew defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Code, Execute, Microsoft, Office, Remote, Vulnerabilities

Post navigation

Previous Post: New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Next Post: Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Related Posts

New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France Cyber Security News
Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet Cyber Security News
Top 10 Best API Security Testing Tools in 2025 Cyber Security News
Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark