Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55243: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft OfficePLUS

0
High
VulnerabilityCVE-2025-55243cvecve-2025-55243cwe-200
Published: Tue Sep 09 2025 (09/09/2025, 17:01:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft OfficePLUS

Description

Exposure of sensitive information to an unauthorized actor in Microsoft Office Plus allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:57:57 UTC

Technical Analysis

CVE-2025-55243 is a high-severity vulnerability identified in Microsoft OfficePLUS version 3.0.0.0, categorized under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. This vulnerability allows an attacker to perform network-based spoofing attacks, leading to unauthorized disclosure of sensitive data. The CVSS v3.1 base score is 7.5, reflecting a high impact on confidentiality without affecting integrity or availability. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), making exploitation relatively straightforward. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The vulnerability was published on September 9, 2025, with no known exploits in the wild at the time of reporting. The lack of available patches suggests that mitigation strategies must be proactive until official updates are released. The vulnerability enables an attacker to spoof network communications, potentially intercepting or redirecting sensitive information processed or transmitted by Microsoft OfficePLUS. This could include confidential documents, user credentials, or other sensitive data handled by the application, thereby compromising confidentiality. Since the vulnerability does not impact integrity or availability, the primary risk is unauthorized data disclosure. The vulnerability's ease of exploitation and network accessibility make it a significant threat, especially in environments where Microsoft OfficePLUS is widely deployed and trusted for handling sensitive information.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability could lead to significant data breaches, violating GDPR and other data protection regulations. Confidential business information, personal data of employees and customers, and intellectual property could be at risk. The unauthorized disclosure could result in financial losses, reputational damage, and regulatory penalties. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data. The network-based nature of the attack means that even remote attackers could exploit this vulnerability without needing internal access or user interaction, increasing the risk of widespread compromise. Additionally, the spoofing capability could facilitate further attacks such as phishing or man-in-the-middle attacks, compounding the threat landscape for European enterprises.

Mitigation Recommendations

European organizations should immediately assess their deployment of Microsoft OfficePLUS version 3.0.0.0 and prioritize upgrading to a patched version once available. Until patches are released, network-level mitigations should be implemented, including strict network segmentation, use of VPNs with strong encryption, and deployment of intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous spoofing activity. Employing strict egress and ingress filtering on network devices can reduce the risk of spoofed packets entering or leaving the network. Organizations should also enforce the use of multi-factor authentication (MFA) and robust encryption for sensitive communications to mitigate the impact of potential data exposure. Regular security awareness training should be conducted to prepare staff for potential phishing attempts that may leverage spoofed information. Finally, organizations should monitor threat intelligence feeds for any emerging exploits related to this CVE and be prepared to respond rapidly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-08-11T20:26:16.633Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e4ce6ed8307545bac5

Added to database: 9/9/2025, 6:28:52 PM

Last enriched: 10/2/2025, 12:57:57 AM

Last updated: 10/30/2025, 7:35:38 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats