Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21338: CWE-190: Integer Overflow or Wraparound in Microsoft Microsoft Office for Android

0
High
VulnerabilityCVE-2025-21338cvecve-2025-21338cwe-190
Published: Tue Jan 14 2025 (01/14/2025, 18:04:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office for Android

Description

GDI+ Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:25:08 UTC

Technical Analysis

CVE-2025-21338 is an integer overflow or wraparound vulnerability (CWE-190) identified in Microsoft Office for Android version 16.0.1, specifically within the GDI+ graphics component. The flaw arises when the software improperly handles integer values, leading to overflow conditions that can corrupt memory and enable remote code execution. An attacker with low privileges on the device can exploit this vulnerability without requiring user interaction, potentially executing arbitrary code in the context of the Office application. This could lead to full compromise of the device’s confidentiality, integrity, and availability. The CVSS 3.1 base score is 7.8, reflecting a high severity due to local attack vector, low attack complexity, low privileges required, and no user interaction. The vulnerability is currently published but has no known exploits in the wild and no patches released yet. The lack of patch availability increases the urgency for organizations to implement interim mitigations. The vulnerability’s presence in a widely used productivity suite on Android devices makes it a significant threat, especially in environments with mobile or BYOD usage. The integer overflow in GDI+ can be triggered by specially crafted documents or content processed by the Office app, allowing attackers to execute arbitrary code remotely once local access is obtained.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread use of Microsoft Office on Android devices, particularly in sectors with mobile workforces such as finance, consulting, and public administration. Exploitation could lead to unauthorized access to sensitive documents, data leakage, and potential lateral movement within corporate networks. The ability to execute code remotely without user interaction increases the threat level, as attackers can leverage this flaw to deploy malware, ransomware, or espionage tools silently. The impact extends to operational disruption and reputational damage. Organizations with Bring Your Own Device (BYOD) policies are especially vulnerable, as attackers could exploit compromised personal devices to infiltrate corporate environments. The absence of patches means that until Microsoft releases updates, organizations must rely on detection and containment strategies. The vulnerability also raises compliance concerns under GDPR due to the risk of data breaches involving personal data processed on affected devices.

Mitigation Recommendations

Given the absence of patches, European organizations should implement strict access controls on Android devices running Microsoft Office 16.0.1, including enforcing strong device authentication and limiting app permissions. Employ Mobile Device Management (MDM) solutions to monitor and restrict installation of untrusted applications and to enforce security policies. Network segmentation should be used to isolate mobile devices from critical infrastructure. Organizations should educate users about the risks of opening untrusted documents and implement endpoint detection and response (EDR) tools capable of identifying anomalous behaviors related to Office apps. Regularly audit devices for signs of compromise and maintain up-to-date backups to mitigate potential ransomware impacts. Once Microsoft releases patches, prioritize immediate deployment across all affected devices. Additionally, consider disabling or restricting the use of Microsoft Office for Android in high-risk environments until patches are available. Collaborate with security vendors to obtain threat intelligence updates related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd529ed239a66badebeb

Added to database: 9/9/2025, 11:50:42 PM

Last enriched: 2/14/2026, 8:25:08 AM

Last updated: 3/26/2026, 10:28:50 AM

Views: 180

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses