Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59229: CWE-248: Uncaught Exception in Microsoft Microsoft Office LTSC 2024

0
Medium
VulnerabilityCVE-2025-59229cvecve-2025-59229cwe-248
Published: Tue Oct 14 2025 (10/14/2025, 17:01:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office LTSC 2024

Description

Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:49:55 UTC

Technical Analysis

CVE-2025-59229 is a vulnerability identified in Microsoft Office LTSC 2024 version 16.0.0, classified under CWE-248 (Uncaught Exception). This flaw arises when the application encounters an unexpected condition that is not properly handled, leading to an unhandled exception. Such an exception causes the application to crash, resulting in a denial of service (DoS) condition. The vulnerability can be exploited by an unauthorized attacker with local access to the system, requiring the user to interact with the vulnerable Office application to trigger the exception. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), the attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The impact is limited to availability (A:H) with no confidentiality or integrity loss. The scope remains unchanged (S:U). No known exploits are currently in the wild, and no official patches have been released yet. The vulnerability could be triggered by specially crafted input or document content that causes the Office application to fail to handle an exception properly. This leads to application crashes, potentially disrupting business workflows and productivity. Since the vulnerability is local and requires user interaction, remote exploitation is not feasible, limiting the attack surface. However, in environments where multiple users share workstations or where local access controls are weak, the risk increases. The vulnerability highlights the importance of robust exception handling in complex software like Microsoft Office to prevent service interruptions.

Potential Impact

For European organizations, the primary impact of CVE-2025-59229 is the potential denial of service on workstations running Microsoft Office LTSC 2024. This can disrupt daily operations, especially in sectors heavily reliant on Office productivity tools such as finance, legal, and government agencies. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could lead to workflow interruptions, delayed document processing, and reduced employee productivity. Organizations with shared or less secure local access environments are more vulnerable to exploitation. Critical infrastructure sectors that depend on continuous availability of office applications for communication and documentation may experience operational setbacks. Additionally, the lack of a patch at the time of disclosure means organizations must rely on interim mitigations, increasing exposure duration. The medium severity rating suggests the threat is moderate but should not be ignored, particularly in environments with high compliance or operational continuity requirements.

Mitigation Recommendations

1. Restrict local access to systems running Microsoft Office LTSC 2024 to trusted users only, minimizing the risk of unauthorized local exploitation. 2. Educate users to avoid opening suspicious or untrusted documents that could trigger the uncaught exception. 3. Monitor application logs and system stability for frequent or unusual Office crashes that may indicate exploitation attempts. 4. Implement application whitelisting and endpoint protection solutions that can detect abnormal application behavior or crashes. 5. Enforce least privilege principles to limit user permissions on workstations, reducing the impact of local attacks. 6. Prepare to deploy official patches or updates from Microsoft promptly once they become available. 7. Consider isolating critical systems or using virtualized environments to contain potential DoS effects. 8. Regularly back up important documents and workflows to mitigate productivity losses during outages. 9. Coordinate with IT and security teams to develop incident response plans addressing potential Office application crashes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T00:32:30.951Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858d3dd1bfb0b7e41c33

Added to database: 10/14/2025, 5:17:01 PM

Last enriched: 1/2/2026, 10:49:55 PM

Last updated: 1/19/2026, 7:56:09 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats