Skip to main content

CVE-2025-53736: CWE-126: Buffer Over-read in Microsoft Microsoft SharePoint Enterprise Server 2016

Medium
VulnerabilityCVE-2025-53736cvecve-2025-53736cwe-126
Published: Tue Aug 12 2025 (08/12/2025, 17:10:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 09/04/2025, 01:01:38 UTC

Technical Analysis

CVE-2025-53736 is a medium-severity vulnerability classified under CWE-126 (Buffer Over-read) affecting Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. The vulnerability arises from a buffer over-read condition in Microsoft Office Word components integrated with SharePoint. This flaw allows an unauthorized attacker to locally disclose sensitive information by reading beyond the intended buffer boundaries. The vulnerability does not require any privileges or user interaction, making it easier to exploit in local scenarios. The CVSS 3.1 base score is 6.8, reflecting a medium severity with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H, indicating local attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, limited confidentiality impact, no integrity impact, but high availability impact. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by attackers with local access to the affected system to extract sensitive information from memory buffers, potentially leading to further attacks or data leakage. The lack of a patch link suggests that remediation may still be pending or in development. Given the integration of Microsoft Office Word with SharePoint, this vulnerability could be triggered when processing or rendering Word documents within SharePoint environments, exposing sensitive data stored or cached in memory buffers.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where Microsoft SharePoint Enterprise Server 2016 is deployed, especially in sectors handling sensitive or confidential information such as government, finance, healthcare, and critical infrastructure. The local nature of the attack vector limits remote exploitation; however, insider threats or attackers who gain local access (e.g., via compromised credentials or physical access) could exploit this vulnerability to disclose sensitive information. The high availability impact suggests that exploitation could also disrupt SharePoint services, affecting business continuity. Given SharePoint's widespread use in European enterprises for document management and collaboration, exploitation could lead to unauthorized disclosure of intellectual property, personal data protected under GDPR, or other confidential organizational data. This could result in regulatory penalties, reputational damage, and operational disruptions.

Mitigation Recommendations

Organizations should implement strict access controls to limit local access to SharePoint servers, including enforcing least privilege principles and robust authentication mechanisms. Monitoring and logging local access attempts can help detect suspicious activities. Since no patch is currently linked, organizations should stay alert for official Microsoft security updates addressing this vulnerability and apply them promptly once available. In the interim, consider isolating SharePoint servers from non-essential users and restricting document processing workflows to trusted personnel. Employ application whitelisting and endpoint protection solutions to prevent unauthorized code execution on SharePoint servers. Additionally, conduct regular security audits and vulnerability assessments focusing on SharePoint environments to identify and remediate potential exploitation paths. Backup critical data and have incident response plans ready to mitigate potential availability impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T03:10:34.739Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774ead5a09ad00349250

Added to database: 8/12/2025, 5:18:06 PM

Last enriched: 9/4/2025, 1:01:38 AM

Last updated: 9/4/2025, 10:23:07 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats