Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Posted on August 13, 2025August 13, 2025 By CWS

Microsoft launched essential safety updates, addressing three critical vulnerabilities in Microsoft Workplace that would permit attackers to execute distant code on affected programs. 

The vulnerabilities, tracked as CVE-2025-53731, CVE-2025-53740, and CVE-2025-53730, have an effect on a number of variations of Microsoft Workplace and pose important safety dangers to organizations and particular person customers worldwide.

Key Takeaways1. Vital Workplace flaws allow code execution through doc preview2. All Workplace variations 2016-2024 affected, tens of millions at risk3. Patches launched August 12 – set up instantly

Use-After-Free Flaws 

The newly disclosed vulnerabilities stem from use-after-free reminiscence corruption points, labeled beneath CWE-416 within the Widespread Weak point Enumeration database. 

Each CVE-2025-53731 and CVE-2025-53740 acquired Vital severity rankings with CVSS base scores of 8.4, whereas CVE-2025-53730, affecting Microsoft Workplace Visio, was rated as Vital with a CVSS rating of seven.8. 

These vulnerabilities share an ordinary assault sample the place unauthorized attackers can exploit reminiscence administration flaws to execute arbitrary code regionally on course programs.

The technical specs reveal regarding assault vectors, with each essential vulnerabilities that includes a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C. 

This means low assault complexity, no privileges required, and no person interplay wanted for exploitation. 

Notably alarming is that the Preview Pane serves as an assault vector for CVE-2025-53731 and CVE-2025-53740, which means customers could possibly be compromised just by previewing malicious Workplace paperwork.

The vulnerabilities have an effect on a complete vary of Microsoft Workplace merchandise, together with Microsoft Workplace 2016, Workplace 2019, Workplace LTSC 2021, Workplace LTSC 2024, and Microsoft 365 Apps for Enterprise throughout each 32-bit and 64-bit architectures. 

Mac customers are additionally in danger, with Microsoft Workplace LTSC for Mac 2021 and 2024 variations requiring instant updates. The widespread affect encompasses tens of millions of customers throughout company and client environments globally.

Safety researchers 0x140ce[LLMole], Li Shuang, and willJ with Vulnerability Analysis Institute, and researchers from Zscaler’s ThreatLabz had been credited with discovering these vulnerabilities by coordinated disclosure processes. 

Microsoft’s Safety Response Middle (MSRC) has confirmed that none of those vulnerabilities have been publicly disclosed or exploited within the wild, with exploitability assessments starting from “Exploitation Unlikely” to “Exploitation Much less Probably”.

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-53731Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53740Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53730Microsoft Workplace Visio Distant Code Execution Vulnerability7.8Important

Mitigations

Microsoft has launched complete safety updates for all affected Workplace variations, with replace KB5002756 addressing the vulnerabilities in Workplace 2016 editions. 

For newer Workplace variations, updates are delivered by Click on-to-Run mechanisms, with detailed data out there by Microsoft’s official safety launch channels. 

Organizations ought to prioritize the instant deployment of those updates, given the essential nature of the vulnerabilities and the potential for exploitation of the Preview Pane.

Safety groups ought to set up complete vulnerability administration applications that stretch past conventional patch administration, incorporating risk intelligence feeds and proactive monitoring for indicators of compromise (IOCs).

Enhance your SOC and assist your crew defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Code, Execute, Microsoft, Office, Remote, Vulnerabilities

Post navigation

Previous Post: New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Next Post: Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Related Posts

UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack Cyber Security News
Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Cyber Security News
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News
Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
  • Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
  • New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
  • Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
  • Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
  • New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
  • Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News