Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53733: CWE-681: Incorrect Conversion between Numeric Types in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-53733cvecve-2025-53733cwe-681
Published: Tue Aug 12 2025 (08/12/2025, 17:10:32 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 10/15/2025, 17:39:30 UTC

Technical Analysis

CVE-2025-53733 is a vulnerability classified under CWE-681, which involves incorrect conversion between numeric types within Microsoft Office Word components integrated into Microsoft SharePoint Enterprise Server 2016 (version 16.0.0). This numeric conversion flaw can lead to memory corruption or logic errors that an attacker can leverage to execute arbitrary code locally on the affected system. The vulnerability does not require any privileges or user interaction, increasing its risk profile. The CVSS 3.1 base score of 8.4 reflects high severity, with impacts on confidentiality, integrity, and availability (all rated high). The attack vector is local (AV:L), meaning the attacker must have local access, but no privileges (PR:N) or user interaction (UI:N) are needed. The vulnerability scope is unchanged (S:U), indicating the exploit affects the vulnerable component only. Although no public exploits are known yet, the vulnerability’s characteristics suggest that once exploited, it could allow attackers to run arbitrary code, potentially leading to full system compromise or lateral movement within an enterprise environment. The vulnerability was reserved in early July 2025 and published in August 2025, with no patches currently available, emphasizing the need for proactive mitigation strategies.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those using Microsoft SharePoint Enterprise Server 2016 for document management and collaboration. Successful exploitation could allow attackers with local access to execute arbitrary code, potentially leading to data breaches, unauthorized data modification, or disruption of services. This is particularly critical for sectors such as government, finance, healthcare, and critical infrastructure, where SharePoint is commonly deployed and sensitive data is processed. The local attack vector means that insider threats or attackers who gain initial footholds on internal networks could leverage this vulnerability to escalate privileges or move laterally. The high impact on confidentiality, integrity, and availability could result in operational downtime, regulatory non-compliance, and reputational damage. Given the lack of known exploits, the immediate risk is moderate but could escalate rapidly once exploit code becomes available.

Mitigation Recommendations

1. Monitor Microsoft’s security advisories closely and apply official patches or updates as soon as they are released to remediate this vulnerability. 2. Restrict local access to SharePoint servers and workstations running Office Word to trusted personnel only, minimizing the risk of local exploitation. 3. Implement strict access controls and endpoint security measures to detect and prevent unauthorized local access. 4. Employ application whitelisting and behavior-based detection tools to identify anomalous code execution related to Office Word processes. 5. Conduct regular security audits and vulnerability assessments focusing on SharePoint environments to identify potential exposure. 6. Educate internal users about the risks of local access exploitation and enforce least privilege principles. 7. Consider network segmentation to isolate critical SharePoint servers from less secure network zones, reducing the attack surface. 8. Prepare incident response plans specifically addressing local code execution scenarios to enable rapid containment if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T03:10:34.739Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774ead5a09ad00349247

Added to database: 8/12/2025, 5:18:06 PM

Last enriched: 10/15/2025, 5:39:30 PM

Last updated: 10/17/2025, 1:59:35 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats