Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62558: CWE-416: Use After Free in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-62558cvecve-2025-62558cwe-416
Published: Tue Dec 09 2025 (12/09/2025, 17:55:59 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:54:59 UTC

Technical Analysis

CVE-2025-62558 is a use-after-free vulnerability classified under CWE-416 affecting Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. The flaw resides in the Microsoft Office Word component integrated with SharePoint, where improper memory management leads to a use-after-free condition. This vulnerability allows an attacker with local access to execute arbitrary code on the affected system by triggering the flaw through user interaction, such as opening a crafted Word document. The CVSS v3.1 score of 7.8 reflects a high severity, with attack vector being local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker could fully compromise the system. The vulnerability was reserved in October 2025 and published in December 2025, with no known exploits in the wild at the time of publication. No official patch links are provided yet, indicating that mitigation may rely on workarounds until a patch is released. The vulnerability is critical for environments where SharePoint 2016 is used extensively, especially in enterprise settings where document collaboration is frequent. Attackers exploiting this flaw could gain code execution capabilities, potentially leading to lateral movement or data exfiltration within an organization.

Potential Impact

For European organizations, the impact of CVE-2025-62558 can be severe due to the widespread use of Microsoft SharePoint Enterprise Server 2016 in enterprise environments for document management and collaboration. Successful exploitation could lead to unauthorized code execution on servers or client machines, resulting in data breaches, disruption of business operations, and potential compromise of sensitive information. Critical sectors such as finance, government, healthcare, and manufacturing that rely on SharePoint for document workflows are particularly vulnerable. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users might open malicious documents or where insider threats exist. The high confidentiality, integrity, and availability impact means attackers could manipulate or destroy data, disrupt services, or establish persistent footholds. Given the lack of known exploits currently, proactive mitigation is essential to prevent future attacks. Additionally, the vulnerability could be leveraged in targeted attacks against European organizations with strategic importance, increasing geopolitical risk.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches for SharePoint Enterprise Server 2016 as soon as they become available. 2. Until patches are released, restrict local access to SharePoint servers and client machines to trusted personnel only. 3. Implement strict user education programs to warn about the risks of opening untrusted or unexpected Word documents, especially those received via email or external sources. 4. Use application whitelisting and endpoint protection solutions capable of detecting and blocking exploitation attempts related to use-after-free vulnerabilities. 5. Employ network segmentation to limit lateral movement if a system is compromised. 6. Regularly audit and monitor logs for suspicious activity indicative of exploitation attempts. 7. Consider upgrading to newer versions of SharePoint or Microsoft Office products that may have resolved this vulnerability. 8. Disable or limit macros and embedded content in Word documents where feasible to reduce attack surface. 9. Enforce the principle of least privilege on user accounts to minimize impact if exploitation occurs. 10. Conduct penetration testing and vulnerability assessments focused on SharePoint environments to identify and remediate related weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e774ebaa3babafb432

Added to database: 12/9/2025, 6:18:15 PM

Last enriched: 1/8/2026, 12:54:59 AM

Last updated: 2/4/2026, 7:24:30 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats