Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62560: CWE-822: Untrusted Pointer Dereference in Microsoft Office Online Server

0
High
VulnerabilityCVE-2025-62560cvecve-2025-62560cwe-822cwe-126
Published: Tue Dec 09 2025 (12/09/2025, 17:56:01 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Office Online Server

Description

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 12/09/2025, 18:31:45 UTC

Technical Analysis

CVE-2025-62560 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Office Online Server, specifically version 16.0.0.0. The issue arises from improper handling of pointers within the Microsoft Office Excel component, which can be exploited by an unauthorized attacker to execute arbitrary code locally on the affected system. The attack vector requires local access (AV:L) and user interaction (UI:R), but no privileges are required (PR:N), meaning an attacker can trick a user into opening a malicious Excel file hosted or processed via Office Online Server. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as successful exploitation can lead to full system compromise. The CVSS 3.1 score of 7.8 reflects a high severity level due to the potential damage and ease of exploitation once a user is tricked. No known exploits have been reported in the wild, and no official patches have been released at the time of publication, increasing the urgency for defensive measures. The vulnerability is significant because Office Online Server is widely used in enterprise environments for collaborative document editing and sharing, making it a valuable target for attackers aiming to compromise organizational infrastructure.

Potential Impact

For European organizations, the impact of CVE-2025-62560 can be substantial. Exploitation could lead to local code execution on servers running Office Online Server, potentially allowing attackers to escalate privileges, move laterally within networks, and access sensitive corporate data. This could compromise confidentiality of documents, integrity of data processed through Office Online Server, and availability of the service, disrupting business operations. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely heavily on Microsoft Office Online Server for document collaboration are particularly vulnerable. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger exploitation, increasing risk. The absence of patches at present means organizations must rely on compensating controls to mitigate risk until updates are available. The threat also raises concerns about insider threats or compromised user accounts being leveraged to trigger the vulnerability.

Mitigation Recommendations

1. Restrict access to Microsoft Office Online Server to trusted networks and users only, using network segmentation and firewall rules. 2. Implement strict file validation and scanning policies to detect and block malicious Excel files before they reach users or the server. 3. Educate users about the risks of opening unsolicited or suspicious Excel documents, emphasizing caution with files received via email or external sources. 4. Monitor logs and network traffic for unusual activity related to Office Online Server, including unexpected file uploads or execution attempts. 5. Employ application whitelisting and endpoint protection solutions on servers hosting Office Online Server to detect and prevent unauthorized code execution. 6. Prepare for rapid deployment of official patches from Microsoft once released, including testing in controlled environments to ensure compatibility. 7. Consider disabling or limiting Excel functionality in Office Online Server if feasible until the vulnerability is addressed. 8. Use multi-factor authentication and strong access controls to reduce the risk of compromised user credentials being used to exploit the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e774ebaa3babafb438

Added to database: 12/9/2025, 6:18:15 PM

Last enriched: 12/9/2025, 6:31:45 PM

Last updated: 12/11/2025, 6:21:34 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats