Skip to main content

CVE-2025-47173: CWE-641: Improper Restriction of Names for Files and Other Resources in Microsoft Microsoft Office 2019

High
VulnerabilityCVE-2025-47173cvecve-2025-47173cwe-641
Published: Tue Jun 10 2025 (06/10/2025, 17:02:42 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Improper input validation in Microsoft Office allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 07/10/2025, 19:35:14 UTC

Technical Analysis

CVE-2025-47173 is a high-severity vulnerability identified in Microsoft Office 2019 (version 19.0.0) that stems from improper input validation related to the restriction of names for files and other resources, classified under CWE-641. This weakness allows an unauthorized attacker to execute arbitrary code locally on the affected system. The vulnerability arises because Microsoft Office 2019 does not adequately restrict or sanitize file/resource names, enabling crafted input to bypass security controls. Exploitation requires local access and some user interaction, such as opening a maliciously crafted Office document. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The vulnerability does not currently have known exploits in the wild, but the potential for local code execution could allow attackers to escalate privileges, install malware, or manipulate sensitive data. Since the attack vector is local, remote exploitation is not feasible without prior access. The vulnerability's scope is limited to Microsoft Office 2019 version 19.0.0, and no patches have been published at the time of analysis.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where Microsoft Office 2019 is widely deployed. Successful exploitation could lead to unauthorized code execution on user machines, potentially compromising sensitive corporate data, intellectual property, and user credentials. This could facilitate lateral movement within networks, data exfiltration, or deployment of ransomware. Given the prevalence of Microsoft Office in European enterprises, including government, finance, healthcare, and critical infrastructure sectors, the impact could be substantial. The requirement for local access and user interaction somewhat limits the attack surface but does not eliminate risk, particularly in scenarios involving phishing or social engineering to deliver malicious documents. Additionally, organizations with less mature endpoint security or those lacking strict user privilege controls may be more vulnerable. The absence of known exploits currently provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, monitor Microsoft’s official channels closely for the release of security patches and apply them promptly once available. Until patches are released, enforce strict application whitelisting and endpoint protection policies to detect and block suspicious Office document behaviors. Employ advanced email filtering and attachment sandboxing to reduce the risk of malicious document delivery via phishing. Educate users about the risks of opening unsolicited or unexpected Office files, emphasizing cautious handling of email attachments. Implement least privilege principles to restrict user permissions, minimizing the impact of local code execution. Utilize endpoint detection and response (EDR) tools to identify anomalous activities indicative of exploitation attempts. Network segmentation can limit lateral movement if a device is compromised. Finally, conduct regular vulnerability assessments and penetration testing focused on Office applications to identify and remediate related weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-01T17:10:57.981Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389964

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 7/10/2025, 7:35:14 PM

Last updated: 7/15/2025, 8:32:35 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats