Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018

0
High
VulnerabilityCVE-2025-29867cvecve-2025-29867cwe-843
Published: Wed Feb 04 2026 (02/04/2026, 04:46:55 UTC)
Source: CVE Database V5
Vendor/Project: Hancom Inc.
Product: Hancom Office 2018

Description

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Hancom Inc. Hancom Office 2018, Hancom Inc. Hancom Office 2020, Hancom Inc. Hancom Office 2022, Hancom Inc. Hancom Office 2024 allows File Content Injection.This issue affects Hancom Office 2018: before 10.0.0.12681; Hancom Office 2020: before 11.0.0.8916; Hancom Office 2022: before 12.0.0.4426; Hancom Office 2024: before 13.0.0.3050.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:10:23 UTC

Technical Analysis

CVE-2025-29867 is a type confusion vulnerability categorized under CWE-843 that affects Hancom Inc.'s Hancom Office suite versions 2018, 2020, 2022, and 2024 prior to specified build numbers. The vulnerability arises from improper handling of resource types within the software, allowing an attacker to access resources using incompatible types. This flaw enables file content injection, which can lead to arbitrary code execution, data corruption, or unauthorized modification of files. The vulnerability requires local access and user interaction but does not require authentication or elevated privileges, making it a significant risk in environments where users may open malicious files or be tricked into interacting with crafted content. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but user interaction is necessary. The vulnerability impacts confidentiality, integrity, and availability at a high level, reflecting the potential for severe consequences if exploited. Although no known exploits are currently reported in the wild, the lack of available patches at the time of reporting necessitates proactive defensive measures. The vulnerability affects multiple versions of Hancom Office, a widely used office productivity suite, particularly in South Korea and other markets where Hancom products have notable penetration.

Potential Impact

The vulnerability poses a significant risk to organizations using Hancom Office, as successful exploitation can lead to arbitrary code execution, enabling attackers to execute malicious payloads, escalate privileges, or disrupt business operations. File content injection can compromise the integrity of documents and potentially leak sensitive information, impacting confidentiality. Availability may also be affected if the injected content causes application crashes or system instability. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk, especially in environments where users frequently exchange files or use removable media. Organizations with high reliance on Hancom Office for document processing, particularly in government, finance, and critical infrastructure sectors, face increased exposure. The absence of known exploits currently provides a window for mitigation, but the high CVSS score underscores the urgency of addressing the vulnerability before it is weaponized.

Mitigation Recommendations

1. Restrict local file access permissions to limit exposure to untrusted files and users. 2. Educate users about the risks of opening files from untrusted sources and the importance of cautious interaction with documents. 3. Monitor and audit file system and application logs for unusual file modifications or access patterns indicative of exploitation attempts. 4. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behaviors related to file content injection. 5. Once available, promptly apply official patches or updates from Hancom Inc. to remediate the vulnerability. 6. Consider isolating or sandboxing Hancom Office usage in high-risk environments to contain potential exploitation. 7. Employ network segmentation to reduce the risk of lateral movement if exploitation occurs. 8. Maintain regular backups of critical documents to enable recovery from potential data corruption or loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
krcert
Date Reserved
2025-03-12T07:03:23.441Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6982d5def9fa50a62f6a7ec2

Added to database: 2/4/2026, 5:15:10 AM

Last enriched: 2/27/2026, 11:10:23 PM

Last updated: 3/24/2026, 12:28:03 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses