Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53766: CWE-122: Heap-based Buffer Overflow in Microsoft Microsoft Office for Android

0
Critical
VulnerabilityCVE-2025-53766cvecve-2025-53766cwe-122
Published: Tue Aug 12 2025 (08/12/2025, 17:10:37 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office for Android

Description

Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:53:33 UTC

Technical Analysis

CVE-2025-53766 is a heap-based buffer overflow vulnerability identified in Microsoft Office for Android version 16.0.1. The vulnerability arises from improper handling of memory in the Windows GDI+ graphics component, which is leveraged by the Office application on Android platforms. This flaw allows an attacker to craft malicious Office documents or data that, when processed by the vulnerable application, cause a buffer overflow on the heap. This overflow can overwrite critical memory structures, enabling the attacker to execute arbitrary code remotely. The vulnerability requires no authentication or user interaction, making it exploitable over a network without user involvement. The CVSS 3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no public exploits have been reported yet, the critical nature of the vulnerability and the widespread use of Microsoft Office on Android devices make it a high-risk issue. The vulnerability could be exploited to deploy malware, ransomware, or conduct espionage by compromising mobile devices used within enterprise environments. The lack of available patches at the time of disclosure necessitates immediate attention to alternative mitigations to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Microsoft Office on Android devices for business communications and document handling. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over affected devices, exfiltrate sensitive data, or disrupt business operations. Sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and the reliance on mobile productivity tools. The ability to exploit this vulnerability without authentication or user interaction increases the likelihood of automated or large-scale attacks, potentially impacting a broad range of organizations. Additionally, compromised devices could serve as entry points for lateral movement within corporate networks, amplifying the overall impact. The threat also raises concerns about compliance with data protection regulations like GDPR, as breaches resulting from this vulnerability could lead to significant legal and financial consequences.

Mitigation Recommendations

Until an official patch is released, European organizations should implement specific mitigations to reduce risk. These include restricting network access to Microsoft Office Android applications through firewall rules and network segmentation to limit exposure to untrusted networks. Employ mobile device management (MDM) solutions to enforce strict application control policies, including disabling the opening of Office documents from untrusted sources or via email attachments. Enable advanced threat protection and endpoint detection and response (EDR) tools on Android devices to monitor for anomalous behavior indicative of exploitation attempts. Educate users about the risks of opening unsolicited Office documents on mobile devices and encourage the use of secure document sharing platforms. Once patches become available, prioritize rapid deployment across all affected devices. Additionally, consider implementing application sandboxing and restricting permissions for Office applications to minimize potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T13:25:25.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774ead5a09ad00349278

Added to database: 8/12/2025, 5:18:06 PM

Last enriched: 2/14/2026, 10:53:33 AM

Last updated: 3/26/2026, 10:22:33 AM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses