Skip to main content

CVE-2025-47170: CWE-416: Use After Free in Microsoft Microsoft 365 Apps for Enterprise

High
VulnerabilityCVE-2025-47170cvecve-2025-47170cwe-416
Published: Tue Jun 10 2025 (06/10/2025, 17:02:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 07/17/2025, 21:07:12 UTC

Technical Analysis

CVE-2025-47170 is a high-severity use-after-free vulnerability (CWE-416) identified in Microsoft 365 Apps for Enterprise, specifically affecting Microsoft Office Word version 16.0.1. The vulnerability arises when the application improperly manages memory, allowing an attacker to exploit a freed memory region. This flaw can be triggered by an unauthorized attacker through user interaction, such as opening a maliciously crafted Word document. Successful exploitation enables the attacker to execute arbitrary code locally with the privileges of the current user. The CVSS 3.1 base score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, but user interaction is necessary. The vulnerability is currently published but has no known exploits in the wild, and no official patches have been linked yet. The use-after-free condition can lead to memory corruption, potentially allowing attackers to bypass security mechanisms and gain control over the affected system. Given the widespread use of Microsoft 365 Apps in enterprise environments, this vulnerability poses a significant risk if weaponized.

Potential Impact

For European organizations, the impact of CVE-2025-47170 could be substantial. Microsoft 365 Apps for Enterprise is widely deployed across various sectors including government, finance, healthcare, and critical infrastructure. Exploitation could lead to unauthorized code execution, resulting in data breaches, disruption of business operations, and potential lateral movement within networks. Confidentiality is at high risk as attackers could access sensitive documents and information. Integrity and availability are also threatened since arbitrary code execution can lead to system compromise or denial of service. The requirement for user interaction (opening a malicious document) means phishing campaigns or social engineering could be effective attack vectors. Given the reliance on Microsoft Office products in European enterprises, this vulnerability could facilitate targeted attacks against high-value organizations, especially those handling sensitive or regulated data.

Mitigation Recommendations

Organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, restrict or monitor the use of macros and embedded content in Word documents, as these are common vectors for triggering such vulnerabilities. Employ advanced email filtering and sandboxing solutions to detect and block malicious documents before reaching end users. User awareness training should emphasize caution when opening unsolicited or unexpected Word files, especially from unknown sources. Deploy endpoint detection and response (EDR) tools capable of identifying anomalous behaviors indicative of exploitation attempts. Network segmentation can limit the spread of an attacker post-compromise. Since no patch is currently available, consider temporarily disabling or restricting Microsoft Word usage in high-risk environments or using application control policies to limit execution of untrusted documents. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-01T17:10:57.981Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c3938994f

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 7/17/2025, 9:07:12 PM

Last updated: 8/3/2025, 12:37:27 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats