Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54905: CWE-822: Untrusted Pointer Dereference in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-54905cvecve-2025-54905cwe-822
Published: Tue Sep 09 2025 (09/09/2025, 17:00:57 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:37:10 UTC

Technical Analysis

CVE-2025-54905 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. The issue arises from improper handling of pointers within Microsoft Office Word components integrated with SharePoint, allowing an attacker with local access to dereference untrusted pointers. This can lead to unauthorized disclosure of sensitive information stored or processed locally and may also cause denial of service conditions by crashing the application or server processes. The vulnerability does not require any privileges but does require user interaction, such as opening a malicious document or triggering a crafted action within Word integrated into SharePoint. The CVSS v3.1 score of 7.1 reflects a high severity due to the combination of local attack vector, low attack complexity, no privileges required, and high impact on confidentiality and availability. Although no public exploits are known at this time, the vulnerability poses a significant risk to environments where SharePoint 2016 is deployed, especially in scenarios where users have local access to systems hosting SharePoint or where Word documents are processed. The lack of an official patch at the time of disclosure necessitates immediate mitigation strategies to reduce exposure.

Potential Impact

For European organizations, the vulnerability could lead to unauthorized disclosure of sensitive corporate or personal data stored or processed via SharePoint Enterprise Server 2016. This is particularly critical for sectors handling confidential information such as finance, healthcare, and government. The availability impact could disrupt business continuity by causing service outages or application crashes, affecting collaboration and document management workflows. Since exploitation requires local access and user interaction, insider threats or compromised endpoints pose the greatest risk. Organizations with remote or hybrid workforces may face increased exposure if endpoint security is insufficient. The confidentiality breach could lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. Additionally, the disruption of SharePoint services could impact productivity and operational efficiency.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement strict local access controls to SharePoint servers and endpoints running Microsoft Office Word. Employ application whitelisting and endpoint protection solutions to detect and block suspicious document activities. Enforce least privilege principles to limit user permissions on SharePoint servers and workstations. Educate users on the risks of opening untrusted documents and implement robust email filtering to reduce phishing vectors. Monitor system logs and SharePoint activity for unusual behavior indicative of exploitation attempts. Consider isolating SharePoint servers from direct user access or using virtual desktop infrastructure (VDI) to limit local exposure. Once Microsoft releases a patch, prioritize its deployment in all affected environments. Regularly update and audit security configurations to ensure compliance with best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-31T18:54:19.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e3ce6ed8307545ba79

Added to database: 9/9/2025, 6:28:51 PM

Last enriched: 12/23/2025, 9:37:10 PM

Last updated: 2/7/2026, 5:25:21 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats