Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62561: CWE-822: Untrusted Pointer Dereference in Microsoft Office Online Server

0
High
VulnerabilityCVE-2025-62561cvecve-2025-62561cwe-822
Published: Tue Dec 09 2025 (12/09/2025, 17:55:39 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Office Online Server

Description

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:55:45 UTC

Technical Analysis

CVE-2025-62561 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Office Online Server version 16.0.0.0, specifically within the Microsoft Office Excel component. The flaw arises when the software dereferences pointers that have not been properly validated or sanitized, allowing an attacker to manipulate memory references. This can lead to arbitrary code execution on the local machine without requiring prior authentication, although user interaction is necessary to trigger the exploit. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, potentially allowing attackers to install malware, steal sensitive data, or disrupt services. The CVSS 3.1 base score of 7.8 indicates a high severity, with attack vector being local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The exploitability is currently theoretical, with no known exploits in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk. The lack of available patches at the time of publication necessitates interim mitigations and heightened monitoring. The vulnerability is particularly relevant for organizations using Office Online Server for collaborative document editing and processing, as exploitation could compromise server integrity and user data.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to widespread use of Microsoft Office Online Server in enterprise environments for document collaboration and processing. Successful exploitation could lead to local code execution on servers, potentially allowing attackers to escalate privileges, move laterally within networks, or disrupt critical business operations. Confidential data processed or stored via Office Online Server could be exposed or manipulated, impacting compliance with GDPR and other data protection regulations. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with multiple users or less stringent access controls. Sectors such as finance, healthcare, government, and critical infrastructure, which heavily rely on Microsoft technologies, could face operational disruptions and reputational damage. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for mitigation.

Mitigation Recommendations

1. Apply security patches promptly once Microsoft releases them for Office Online Server version 16.0.0.0. 2. Until patches are available, restrict local access to Office Online Server systems to trusted personnel only, employing strict access controls and monitoring. 3. Implement application whitelisting and endpoint protection to detect and prevent unauthorized code execution on servers. 4. Educate users about the risks of interacting with untrusted documents or links that could trigger the vulnerability. 5. Monitor system logs and network traffic for unusual activity indicative of exploitation attempts, including unexpected process launches or memory access patterns. 6. Employ network segmentation to isolate Office Online Server infrastructure from critical systems to limit lateral movement in case of compromise. 7. Review and harden user privilege assignments to minimize the impact of local code execution. 8. Conduct regular vulnerability assessments and penetration testing focused on Office Online Server deployments to identify and remediate weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e774ebaa3babafb43b

Added to database: 12/9/2025, 6:18:15 PM

Last enriched: 1/8/2026, 12:55:45 AM

Last updated: 2/7/2026, 2:57:50 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats