Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54900: CWE-122: Heap-based Buffer Overflow in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-54900cvecve-2025-54900cwe-122
Published: Tue Sep 09 2025 (09/09/2025, 17:01:27 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 23:54:27 UTC

Technical Analysis

CVE-2025-54900 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting Microsoft Office Excel in Microsoft 365 Apps for Enterprise version 16.0.1. The vulnerability arises from improper handling of memory buffers during Excel file processing, which can be exploited by an attacker to execute arbitrary code on the victim's machine. Exploitation requires the victim to open a specially crafted Excel file, thus necessitating user interaction but no prior authentication or privileges. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with impacts on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no official patches have been released as of the publication date. The vulnerability was reserved on July 31, 2025, and published on September 9, 2025. This flaw poses a significant risk to environments where Microsoft 365 Apps for Enterprise is widely deployed, especially in enterprise and government sectors.

Potential Impact

If exploited, this vulnerability allows attackers to execute arbitrary code with the privileges of the user opening the malicious Excel file. This can lead to full system compromise, including data theft, installation of malware, ransomware deployment, or lateral movement within a network. The high impact on confidentiality, integrity, and availability means sensitive organizational data and critical systems could be severely affected. Since exploitation requires user interaction, phishing or social engineering campaigns could be used to deliver malicious files. The absence of known exploits currently reduces immediate risk, but the lack of a patch increases the window of exposure. Organizations worldwide that rely heavily on Microsoft 365 Apps for Enterprise, especially those with high-value targets or sensitive data, face significant operational and reputational risks.

Mitigation Recommendations

1. Restrict the opening of Excel files from untrusted or unknown sources through email filtering and endpoint security controls. 2. Employ application whitelisting or allowlisting to prevent execution of unauthorized code. 3. Use Microsoft Defender for Office 365 or equivalent advanced threat protection solutions to detect and block malicious documents. 4. Educate users about the risks of opening unsolicited or suspicious Excel files, emphasizing phishing awareness. 5. Monitor endpoint behavior for unusual activities indicative of exploitation attempts, such as unexpected process spawning or memory anomalies. 6. Implement network segmentation to limit lateral movement if a system is compromised. 7. Regularly back up critical data and verify backup integrity to enable recovery in case of compromise. 8. Stay alert for official patches or updates from Microsoft and apply them promptly once available. 9. Consider deploying exploit mitigation technologies such as Control Flow Guard (CFG) and Data Execution Prevention (DEP) where supported. 10. Conduct proactive threat hunting and vulnerability scanning to identify potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-31T18:54:19.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c064ee22bccc7413ab98bc

Added to database: 9/9/2025, 5:33:34 PM

Last enriched: 2/28/2026, 11:54:27 PM

Last updated: 3/23/2026, 3:14:59 PM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses