Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59222: CWE-416: Use After Free in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-59222cvecve-2025-59222cwe-416
Published: Tue Oct 14 2025 (10/14/2025, 17:01:36 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 01/09/2026, 23:57:34 UTC

Technical Analysis

CVE-2025-59222 is a use-after-free vulnerability classified under CWE-416, affecting Microsoft SharePoint Enterprise Server 2016 (version 16.0.0). The flaw resides in the way Microsoft Office Word components handle memory, leading to a use-after-free condition that can be triggered when a user opens or interacts with a specially crafted document. This vulnerability allows an attacker without privileges to execute arbitrary code locally on the affected system, potentially leading to full compromise of the SharePoint server or client machines depending on deployment. The CVSS 3.1 base score of 7.8 reflects high impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits have been reported in the wild, and no official patches have been released as of the publication date (October 14, 2025). The vulnerability's exploitation could allow attackers to execute arbitrary code, potentially leading to data theft, service disruption, or further lateral movement within an enterprise network. Given SharePoint's widespread use in enterprise collaboration and document management, this vulnerability poses a significant risk to organizations relying on SharePoint 2016.

Potential Impact

For European organizations, the impact of CVE-2025-59222 could be substantial. SharePoint Enterprise Server 2016 is widely used across various sectors including government, finance, healthcare, and manufacturing, all of which handle sensitive data and require high availability. Successful exploitation could lead to unauthorized code execution, resulting in data breaches, intellectual property theft, disruption of business operations, and potential compliance violations under GDPR. The local attack vector and requirement for user interaction mean that insider threats or targeted phishing campaigns could be effective attack vectors. Additionally, compromised SharePoint servers could serve as pivot points for attackers to infiltrate broader enterprise networks. The lack of an available patch increases the urgency for organizations to implement interim mitigations to protect their environments.

Mitigation Recommendations

1. Restrict and monitor the handling of Microsoft Word documents within SharePoint environments, especially those originating from untrusted sources. 2. Implement strict user training and awareness programs to reduce the risk of users opening malicious documents. 3. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior related to use-after-free exploitation. 4. Use network segmentation to limit the exposure of SharePoint servers and restrict lateral movement in case of compromise. 5. Regularly audit and monitor SharePoint logs and system behavior for signs of exploitation attempts or unusual activity. 6. Apply the principle of least privilege to SharePoint users and service accounts to minimize potential damage. 7. Stay informed about official Microsoft security advisories and apply patches immediately once available. 8. Consider deploying virtual patching or intrusion prevention systems that can detect and block exploitation attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T00:32:30.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858d3dd1bfb0b7e40ce5

Added to database: 10/14/2025, 5:17:01 PM

Last enriched: 1/9/2026, 11:57:34 PM

Last updated: 1/19/2026, 8:00:45 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats