Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55243: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft OfficePLUS

0
High
VulnerabilityCVE-2025-55243cvecve-2025-55243cwe-200
Published: Tue Sep 09 2025 (09/09/2025, 17:01:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft OfficePLUS

Description

Exposure of sensitive information to an unauthorized actor in Microsoft Office Plus allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 11/27/2025, 04:35:15 UTC

Technical Analysis

CVE-2025-55243 is a vulnerability identified in Microsoft OfficePLUS version 3.0.0.0 that results in the exposure of sensitive information to unauthorized actors. The vulnerability is categorized under CWE-200, which involves the unintended disclosure of information that should remain confidential. This flaw allows an attacker to perform spoofing attacks over a network, meaning the attacker can impersonate legitimate entities or services to intercept or access sensitive data transmitted or processed by the affected software. The CVSS 3.1 base score of 7.5 (high severity) reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality to a high degree (C:H) without impacting integrity or availability. The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component. The exploitability is considered low complexity (AC:L), and the vulnerability has an official release status (RL:O) with confirmed report confidence (RC:C). No patches or known exploits are currently available, which means organizations must rely on compensating controls until a fix is released. The vulnerability's ability to facilitate spoofing can lead to unauthorized data disclosure, potentially exposing sensitive corporate or personal information handled within Microsoft OfficePLUS. This could have significant implications for data privacy and regulatory compliance, especially under frameworks like GDPR. The lack of required authentication or user interaction increases the risk of automated or remote exploitation, making it a critical concern for network security teams.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability could lead to significant data breaches, compromising confidential business information, intellectual property, or personal data of EU citizens. This can result in regulatory penalties under GDPR, loss of customer trust, and potential financial damages. Since Microsoft OfficePLUS is widely used across Europe in both public and private sectors, the vulnerability could affect a broad range of industries including finance, healthcare, government, and education. The spoofing capability may also facilitate further attacks such as phishing or man-in-the-middle, amplifying the threat landscape. The absence of integrity and availability impact means systems may continue to operate normally, potentially delaying detection of the breach. The network-based attack vector allows remote exploitation, increasing the risk for organizations with exposed or poorly segmented networks. Overall, the vulnerability poses a high risk to confidentiality and privacy, necessitating immediate attention to prevent unauthorized data exposure.

Mitigation Recommendations

1. Implement network segmentation and strict access controls to limit exposure of Microsoft OfficePLUS services to trusted internal networks only. 2. Deploy and tune intrusion detection/prevention systems (IDS/IPS) to identify and block spoofing attempts and anomalous network traffic patterns. 3. Enforce strong network authentication and encryption protocols (e.g., TLS) for all communications involving OfficePLUS to reduce the risk of interception. 4. Monitor logs and network traffic for unusual access patterns or data exfiltration indicators related to OfficePLUS. 5. Prepare an incident response plan specifically addressing potential data exposure incidents involving OfficePLUS. 6. Engage with Microsoft and subscribe to security advisories to receive timely updates and patches once released. 7. Conduct regular security awareness training to help employees recognize potential spoofing or phishing attempts that could leverage this vulnerability. 8. Consider temporary disabling or restricting features in OfficePLUS that are not essential and may increase attack surface until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.633Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e4ce6ed8307545bac5

Added to database: 9/9/2025, 6:28:52 PM

Last enriched: 11/27/2025, 4:35:15 AM

Last updated: 12/13/2025, 3:38:34 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats