Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55243: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft OfficePLUS

0
High
VulnerabilityCVE-2025-55243cvecve-2025-55243cwe-200
Published: Tue Sep 09 2025 (09/09/2025, 17:01:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft OfficePLUS

Description

Exposure of sensitive information to an unauthorized actor in Microsoft Office Plus allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:43:37 UTC

Technical Analysis

CVE-2025-55243 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects Microsoft OfficePLUS version 3.0.0.0 and was published on September 9, 2025. The vulnerability allows an attacker to perform spoofing over a network, leading to unauthorized disclosure of sensitive data. The CVSS v3.1 score is 7.5 (high), with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and an impact limited to confidentiality (C:H, I:N, A:N). This means an attacker can remotely exploit the vulnerability without authentication or user involvement, resulting in high confidentiality loss but no impact on integrity or availability. The vulnerability likely arises from improper validation or handling of data within OfficePLUS network communications, enabling attackers to intercept or spoof data exchanges. No patches or known exploits are currently available, but the vulnerability's characteristics suggest it could be leveraged in targeted attacks to extract sensitive information from affected systems. The lack of required privileges and user interaction increases the risk of widespread exploitation once an exploit becomes available.

Potential Impact

For European organizations, the primary impact is the unauthorized disclosure of sensitive information, which can lead to data breaches, loss of intellectual property, and exposure of confidential communications. This can have regulatory consequences under GDPR and other data protection laws, resulting in fines and reputational damage. The vulnerability's network-based exploitation vector means that organizations with exposed OfficePLUS services or insufficient network segmentation are particularly vulnerable. Critical sectors such as finance, healthcare, government, and energy, which heavily rely on Microsoft Office products for daily operations and sensitive data handling, face increased risk. The absence of integrity or availability impact means operational disruption is unlikely, but confidentiality breaches can facilitate further attacks such as phishing, social engineering, or targeted espionage. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high confidentiality impact warrant urgent attention.

Mitigation Recommendations

1. Immediately restrict network access to Microsoft OfficePLUS services, especially from untrusted or external networks, using firewalls and network segmentation. 2. Monitor network traffic for unusual or suspicious activity related to OfficePLUS communications, employing intrusion detection/prevention systems (IDS/IPS) with updated signatures. 3. Implement strict access controls and network-level authentication where possible to limit exposure. 4. Prepare for rapid deployment of official patches or updates from Microsoft once released; establish a patch management process prioritizing this vulnerability. 5. Conduct internal audits to identify all instances of OfficePLUS version 3.0.0.0 and assess exposure levels. 6. Educate IT and security teams about the vulnerability’s characteristics to enhance detection and response capabilities. 7. Consider deploying endpoint detection and response (EDR) tools to identify potential exploitation attempts. 8. Review and enhance data encryption practices for sensitive information handled by OfficePLUS to reduce impact in case of data interception.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.633Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e4ce6ed8307545bac5

Added to database: 9/9/2025, 6:28:52 PM

Last enriched: 12/23/2025, 9:43:37 PM

Last updated: 2/5/2026, 6:00:29 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats