CVE-2025-47165

| EUVD-2025-17734 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17734
PoC Detected
Jul 09, 2025 - 14:02 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 17:23 nvd
HIGH 7.8

Description

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Analysis

Use-after-free vulnerability in Microsoft Office Excel that allows local code execution with high severity (CVSS 7.8). An attacker with local access can trigger the vulnerability through user interaction (opening a malicious file) to execute arbitrary code with the privileges of the Excel process, potentially achieving full system compromise. No KEV status, active exploitation data, or public POC availability was confirmed in the provided dataset, but the high CVSS score and local attack vector indicate this requires prompt patching.

Technical Context

The vulnerability exists in Microsoft Office Excel's memory management subsystem, specifically classified as CWE-416 (Use After Free). This memory safety flaw occurs when Excel processes crafted file content that causes the application to reference memory that has been previously freed, allowing an attacker to corrupt heap state or inject malicious code. The vulnerability likely resides in Excel's parsing or rendering engine when handling specific cell objects, formulas, or embedded content. The local attack vector (AV:L) indicates the attacker must have file system or direct system access to deliver the malicious Excel file. Affected products include Microsoft Office Excel across multiple versions (exact version ranges would be specified in CVE-2025-47165 vendor advisories from Microsoft).

Affected Products

Microsoft Office Excel (specific versions not provided in dataset; consult Microsoft Security Advisory for CVE-2025-47165). Likely affected versions: Excel 2016, Excel 2019, Microsoft 365 Excel (all recent versions). CPE would be structured as 'cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*' or 'cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:*:*' with version constraints. Windows operating system (AV:L constraint). Consult official Microsoft Security Update Guide (portal.msrc.microsoft.com) for definitive patch status and affected build numbers.

Remediation

Immediate: (1) Apply Microsoft security patches when released (monitor Microsoft Security Response Center); (2) Temporary workaround—disable Excel macros and restrict file opening from untrusted sources; restrict file type associations if possible. Medium-term: (1) Update to patched Excel versions via Windows Update or Office Update; (2) Deploy detection rules via endpoint protection to monitor for suspicious Excel process behavior; (3) Implement file content filtering/scanning for suspicious Excel files at network ingress. For enterprise: Use Group Policy to restrict Excel file execution context and block untrusted locations. Specific patch versions and KB numbers should be obtained from Microsoft's official security advisory for CVE-2025-47165.

Priority Score

59
Low Medium High Critical
KEV: 0
EPSS: +0.5
CVSS: +39
POC: +20

Share

CVE-2025-47165 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy