Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62558: CWE-416: Use After Free in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-62558cvecve-2025-62558cwe-416
Published: Tue Dec 09 2025 (12/09/2025, 17:55:59 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:26:50 UTC

Technical Analysis

CVE-2025-62558 is a use-after-free vulnerability classified under CWE-416 found in Microsoft 365 Apps for Enterprise, specifically in Microsoft Word version 16.0.1. A use-after-free occurs when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior such as arbitrary code execution. In this case, an attacker can craft a malicious Word document that, when opened by a user, triggers the vulnerability. This allows the attacker to execute code with the privileges of the current user locally. The vulnerability requires user interaction (opening the malicious document) but does not require any prior authentication or elevated privileges, making it accessible to a wide range of attackers. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that the attack vector is local, with low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality, integrity, and availability is high, meaning an attacker can fully compromise the affected system. Although no known exploits are reported in the wild yet, the vulnerability's nature and severity make it a critical concern for organizations relying on Microsoft 365 Apps. No patch links are currently available, indicating that remediation may not yet be released, emphasizing the need for vigilance and interim mitigations.

Potential Impact

The vulnerability allows attackers to execute arbitrary code locally with the user's privileges, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, modification or deletion of critical files, and disruption of services. Since Microsoft 365 Apps are widely used in enterprises globally, exploitation could lead to widespread operational disruptions, data breaches, and potential lateral movement within networks. The requirement for user interaction (opening a malicious document) means phishing or social engineering campaigns could be effective attack vectors. Organizations that do not promptly address this vulnerability risk exposure to ransomware, espionage, and data theft. The high impact on confidentiality, integrity, and availability underscores the critical nature of this threat.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Enforce strict email filtering and attachment scanning to block or quarantine suspicious Word documents. 2) Educate users to avoid opening unsolicited or unexpected Word files, especially from unknown sources. 3) Use application control or whitelisting to restrict execution of untrusted Office macros or scripts. 4) Enable Protected View and other Microsoft Office security features that limit document capabilities by default. 5) Monitor endpoint behavior for unusual activity indicative of exploitation attempts. 6) Employ endpoint detection and response (EDR) solutions to detect and contain exploitation attempts rapidly. 7) Prepare for rapid deployment of patches once Microsoft releases an update. 8) Consider network segmentation to limit lateral movement if a compromise occurs. These targeted actions go beyond generic advice by focusing on the specific attack vector and exploitation method.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e774ebaa3babafb432

Added to database: 12/9/2025, 6:18:15 PM

Last enriched: 3/1/2026, 12:26:50 AM

Last updated: 3/25/2026, 10:23:26 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses