Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62200: CWE-822: Untrusted Pointer Dereference in Microsoft Office Online Server

0
High
VulnerabilityCVE-2025-62200cvecve-2025-62200cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:41 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Office Online Server

Description

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:17:12 UTC

Technical Analysis

CVE-2025-62200 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Office Online Server, specifically version 16.0.0.0. The vulnerability arises from improper handling of pointers within Microsoft Office Excel components in the Office Online Server environment. An attacker who can trick a user into interacting with a maliciously crafted Excel file or component can cause the server process to dereference untrusted pointers, leading to arbitrary code execution locally. The vulnerability does not require prior authentication (PR:N) but does require user interaction (UI:R), such as opening or processing a malicious file. The attack vector is local (AV:L), meaning the attacker must have local access to the system or be able to execute code locally to trigger the flaw. The vulnerability impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H), potentially allowing full system compromise. The CVSS score of 7.8 reflects the high impact and moderate complexity of exploitation. No public exploits are currently known, and no patches have been linked yet, indicating that organizations should monitor for updates from Microsoft. The vulnerability is particularly concerning in environments where Office Online Server is exposed to multiple users or integrated into collaborative workflows, as it could facilitate lateral movement or privilege escalation within internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-62200 can be significant, especially for enterprises and public sector entities relying on Microsoft Office Online Server for document collaboration and productivity. Successful exploitation could lead to local code execution on critical servers, resulting in data breaches, disruption of business operations, and potential spread of malware within internal networks. Confidential information processed or stored via Office Online Server could be exposed or altered, undermining data integrity and compliance with regulations such as GDPR. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, particularly in environments with shared or poorly segmented access. Organizations in sectors like finance, government, healthcare, and critical infrastructure in Europe could face operational and reputational damage if this vulnerability is exploited. Additionally, the lack of known exploits currently provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for Office Online Server as soon as they become available. 2. Restrict local access to Office Online Server hosts to trusted administrators only, minimizing the risk of local exploitation. 3. Implement strict user privilege management and enforce the principle of least privilege to reduce the impact of potential local code execution. 4. Employ application whitelisting and endpoint protection solutions on servers hosting Office Online Server to detect and block suspicious activities. 5. Use network segmentation to isolate Office Online Server infrastructure from less trusted network zones and limit lateral movement opportunities. 6. Educate users and administrators about the risks of opening untrusted or unexpected Excel files, especially in environments where Office Online Server is accessible. 7. Enable detailed logging and monitoring on Office Online Server to detect anomalous behavior indicative of exploitation attempts. 8. Consider deploying additional security controls such as Host Intrusion Prevention Systems (HIPS) and Endpoint Detection and Response (EDR) tools to identify and respond to exploitation attempts rapidly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-08T20:10:09.345Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4b47ab3590319dbeac

Added to database: 11/11/2025, 6:11:23 PM

Last enriched: 1/2/2026, 11:17:12 PM

Last updated: 1/7/2026, 4:54:20 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats