Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30386: CWE-416: Use After Free in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-30386cvecve-2025-30386cwe-416
Published: Tue May 13 2025 (05/13/2025, 16:58:45 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:13:24 UTC

Technical Analysis

CVE-2025-30386 is a use-after-free vulnerability classified under CWE-416 affecting Microsoft 365 Apps for Enterprise, specifically version 16.0.1. Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior such as arbitrary code execution. In this case, the vulnerability allows an unauthorized attacker to execute code locally without requiring user interaction or privileges, indicating a low attack complexity and no prerequisite authentication. The CVSS v3.1 base score of 8.4 reflects high impact on confidentiality, integrity, and availability, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability could be exploited by an attacker who gains local access to the system, potentially through other means such as phishing or physical access, to execute arbitrary code with the privileges of the current user. This could lead to full system compromise, data theft, or disruption of services. Microsoft has published the vulnerability but has not yet released a patch, and no known exploits are currently reported in the wild. The vulnerability was reserved in March 2025 and published in May 2025, indicating recent discovery and disclosure. Given the widespread use of Microsoft 365 Apps for Enterprise in corporate environments, this vulnerability poses a significant risk to enterprise security.

Potential Impact

The impact of CVE-2025-30386 is substantial for organizations globally. Successful exploitation can lead to arbitrary code execution with the privileges of the logged-in user, potentially allowing attackers to install malware, steal sensitive information, or disrupt business operations. Since Microsoft 365 Apps for Enterprise is widely deployed in corporate, government, and educational institutions, the vulnerability could be leveraged to compromise critical systems and data. The lack of required user interaction and privileges lowers the barrier for exploitation once local access is obtained, increasing the risk of lateral movement within networks. This vulnerability threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution, and availability by potentially causing system crashes or denial of service. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure. Organizations that delay patching or mitigation may face increased exposure to targeted attacks or opportunistic exploitation.

Mitigation Recommendations

To mitigate CVE-2025-30386, organizations should prioritize the following actions: 1) Monitor Microsoft’s official channels for the release of security patches and apply them immediately upon availability to eliminate the vulnerability. 2) Implement application whitelisting and control mechanisms to restrict unauthorized code execution within Microsoft 365 Apps and related processes. 3) Enforce the principle of least privilege to limit user permissions, reducing the impact of local code execution. 4) Employ endpoint detection and response (EDR) solutions to monitor for suspicious behaviors indicative of exploitation attempts, such as anomalous memory usage or process spawning. 5) Educate users on security best practices to prevent initial local access vectors, including phishing awareness and device security. 6) Regularly audit and harden local system configurations to minimize attack surfaces. 7) Consider network segmentation to contain potential lateral movement following exploitation. These targeted measures go beyond generic advice by focusing on controlling local execution and rapid patch deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-21T19:09:29.815Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb9f8

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/26/2026, 9:13:24 PM

Last updated: 3/24/2026, 7:45:39 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses