Microsoft launched essential safety updates, addressing three critical vulnerabilities in Microsoft Workplace that would permit attackers to execute distant code on affected programs.
The vulnerabilities, tracked as CVE-2025-53731, CVE-2025-53740, and CVE-2025-53730, have an effect on a number of variations of Microsoft Workplace and pose important safety dangers to organizations and particular person customers worldwide.
Key Takeaways1. Vital Workplace flaws allow code execution through doc preview2. All Workplace variations 2016-2024 affected, tens of millions at risk3. Patches launched August 12 – set up instantly
Use-After-Free Flaws
The newly disclosed vulnerabilities stem from use-after-free reminiscence corruption points, labeled beneath CWE-416 within the Widespread Weak point Enumeration database.
Each CVE-2025-53731 and CVE-2025-53740 acquired Vital severity rankings with CVSS base scores of 8.4, whereas CVE-2025-53730, affecting Microsoft Workplace Visio, was rated as Vital with a CVSS rating of seven.8.
These vulnerabilities share an ordinary assault sample the place unauthorized attackers can exploit reminiscence administration flaws to execute arbitrary code regionally on course programs.
The technical specs reveal regarding assault vectors, with each essential vulnerabilities that includes a CVSS vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C.
This means low assault complexity, no privileges required, and no person interplay wanted for exploitation.
Notably alarming is that the Preview Pane serves as an assault vector for CVE-2025-53731 and CVE-2025-53740, which means customers could possibly be compromised just by previewing malicious Workplace paperwork.
The vulnerabilities have an effect on a complete vary of Microsoft Workplace merchandise, together with Microsoft Workplace 2016, Workplace 2019, Workplace LTSC 2021, Workplace LTSC 2024, and Microsoft 365 Apps for Enterprise throughout each 32-bit and 64-bit architectures.
Mac customers are additionally in danger, with Microsoft Workplace LTSC for Mac 2021 and 2024 variations requiring instant updates. The widespread affect encompasses tens of millions of customers throughout company and client environments globally.
Safety researchers 0x140ce[LLMole], Li Shuang, and willJ with Vulnerability Analysis Institute, and researchers from Zscaler’s ThreatLabz had been credited with discovering these vulnerabilities by coordinated disclosure processes.
Microsoft’s Safety Response Middle (MSRC) has confirmed that none of those vulnerabilities have been publicly disclosed or exploited within the wild, with exploitability assessments starting from “Exploitation Unlikely” to “Exploitation Much less Probably”.
CVETitleCVSS 3.1 ScoreSeverityCVE-2025-53731Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53740Microsoft Workplace Distant Code Execution Vulnerability8.4 CriticalCVE-2025-53730Microsoft Workplace Visio Distant Code Execution Vulnerability7.8Important
Mitigations
Microsoft has launched complete safety updates for all affected Workplace variations, with replace KB5002756 addressing the vulnerabilities in Workplace 2016 editions.
For newer Workplace variations, updates are delivered by Click on-to-Run mechanisms, with detailed data out there by Microsoft’s official safety launch channels.
Organizations ought to prioritize the instant deployment of those updates, given the essential nature of the vulnerabilities and the potential for exploitation of the Preview Pane.
Safety groups ought to set up complete vulnerability administration applications that stretch past conventional patch administration, incorporating risk intelligence feeds and proactive monitoring for indicators of compromise (IOCs).
Enhance your SOC and assist your crew defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.