Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53799: CWE-908: Use of Uninitialized Resource in Microsoft Microsoft Office for Android

0
Medium
VulnerabilityCVE-2025-53799cvecve-2025-53799cwe-908
Published: Tue Sep 09 2025 (09/09/2025, 17:01:10 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office for Android

Description

Use of uninitialized resource in Windows Imaging Component allows an unauthorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:17:19 UTC

Technical Analysis

CVE-2025-53799 is a vulnerability identified in Microsoft Office for Android version 16.0.1, specifically related to the Windows Imaging Component (WIC). The root cause is the use of an uninitialized resource, classified under CWE-908, which can lead to unintended disclosure of sensitive information. An uninitialized resource means that memory or data structures are accessed before being properly set, potentially leaking residual data from memory. This vulnerability allows an unauthorized attacker with local access to the device to extract confidential information without requiring any privileges. However, exploitation requires user interaction, such as opening a malicious file or triggering a specific action within the Office app. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. No known exploits have been reported in the wild, and no official patches have been linked yet, though Microsoft is likely to release updates. The vulnerability affects only a specific version (16.0.1) of Microsoft Office for Android, which narrows the scope but still poses a risk to users on that version. The flaw could be exploited by attackers who gain local access to a device, such as through physical access or via other malware, to extract sensitive data from memory buffers used by the imaging component within Office documents.

Potential Impact

The primary impact of CVE-2025-53799 is unauthorized disclosure of sensitive information on affected Android devices running Microsoft Office version 16.0.1. This could lead to leakage of confidential business or personal data, potentially facilitating further attacks such as social engineering or identity theft. Since the vulnerability requires local access and user interaction, remote exploitation is not feasible, limiting the threat mainly to scenarios where attackers have physical access or have already compromised the device. Organizations relying on Microsoft Office for Android for document handling may face risks of data leakage if devices are lost, stolen, or infected with malware that can trigger the vulnerability. The lack of impact on integrity and availability means the vulnerability does not allow data modification or denial of service, but confidentiality breaches alone can have serious consequences, especially in regulated industries. The medium severity score indicates a moderate risk that should be addressed promptly to prevent potential data exposure.

Mitigation Recommendations

To mitigate CVE-2025-53799, organizations should: 1) Restrict physical access to devices running Microsoft Office for Android to trusted users only. 2) Educate users to avoid opening suspicious or untrusted Office documents that could trigger the vulnerability. 3) Monitor for official Microsoft security advisories and apply patches or updates promptly once released for the affected Office version. 4) Employ mobile device management (MDM) solutions to enforce security policies, including app version control and remote wipe capabilities in case of device loss. 5) Use endpoint protection tools on Android devices that can detect or block malicious files or behaviors targeting Office apps. 6) Limit the use of local accounts without strong authentication to reduce unauthorized local access. 7) Consider disabling or restricting features related to the Windows Imaging Component within Office apps if feasible until a patch is available. These steps go beyond generic advice by focusing on controlling local access, user behavior, and proactive patch management specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T13:40:07.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e0ce6ed8307545b98e

Added to database: 9/9/2025, 6:28:48 PM

Last enriched: 2/21/2026, 9:17:19 PM

Last updated: 3/25/2026, 3:09:34 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses