Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54907: CWE-122: Heap-based Buffer Overflow in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-54907cvecve-2025-54907cwe-122
Published: Tue Sep 09 2025 (09/09/2025, 17:00:58 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:29:13 UTC

Technical Analysis

CVE-2025-54907 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting Microsoft Office Visio within Microsoft 365 Apps for Enterprise version 16.0.1. The vulnerability arises from improper handling of data in memory buffers, allowing an attacker to overwrite heap memory. When a user opens a specially crafted Visio file, the overflow can be triggered, enabling execution of arbitrary code with the privileges of the current user. The attack vector requires local access and user interaction, such as opening or previewing a malicious file, but does not require prior authentication or elevated privileges. The vulnerability impacts confidentiality, integrity, and availability, potentially allowing attackers to install malware, steal sensitive information, or disrupt operations. Although no public exploits have been reported, the high CVSS score (7.8) reflects the significant risk posed by this flaw. The vulnerability was reserved on July 31, 2025, and published on September 9, 2025, but no patches have been linked yet, indicating that organizations must be vigilant and apply updates promptly once available.

Potential Impact

The impact of CVE-2025-54907 is substantial for organizations worldwide using Microsoft 365 Apps for Enterprise, especially those relying on Visio for diagramming and documentation. Successful exploitation can lead to arbitrary code execution, enabling attackers to install persistent malware, exfiltrate sensitive data, or disrupt business processes. Since the vulnerability affects confidentiality, integrity, and availability, it poses a risk to data security and operational continuity. The requirement for user interaction means phishing or social engineering campaigns could be used to deliver malicious Visio files. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, where Microsoft 365 adoption is high, face increased risk. The absence of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization exists once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-54907, organizations should: 1) Monitor Microsoft security advisories closely and apply patches immediately once released. 2) Implement strict email and file filtering to block or quarantine suspicious Visio files, especially from untrusted sources. 3) Disable Visio file preview features in email clients and document management systems to reduce accidental triggering. 4) Educate users about the risks of opening unsolicited or unexpected Visio files and encourage verification of file sources. 5) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 6) Use network segmentation to limit the impact of potential compromises. 7) Regularly back up critical data and verify recovery procedures to minimize disruption from potential attacks. These steps go beyond generic advice by focusing on specific controls related to Visio file handling and user interaction vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-31T18:54:19.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e3ce6ed8307545ba7f

Added to database: 9/9/2025, 6:28:51 PM

Last enriched: 2/21/2026, 9:29:13 PM

Last updated: 3/24/2026, 9:17:38 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses