CVE-2025-47169

| EUVD-2025-17730 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17730
CVE Published
Jun 10, 2025 - 17:23 nvd
HIGH 7.8

Description

Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Analysis

Heap-based buffer overflow vulnerability in Microsoft Office Word that allows local, unauthenticated attackers to execute arbitrary code with high impact on confidentiality, integrity, and availability. The vulnerability requires user interaction (opening a malicious document) but no elevated privileges, making it a significant local code execution threat affecting Word users who open untrusted documents.

Technical Context

The vulnerability exists in Microsoft Office Word's document parsing engine, specifically in heap memory management during the processing of specially crafted Office Open XML (.docx) or legacy binary Word documents (.doc). CWE-122 (Heap-based Buffer Overflow) indicates that the vulnerable code fails to properly validate buffer boundaries when copying data into heap-allocated memory regions, allowing an attacker to write beyond intended buffer limits. This occurs during document deserialization, likely in components handling embedded objects, font processing, or shape rendering. The Local Attack Vector (AV:L) indicates the malicious document must be processed on the target system, and the Requires User Interaction (UI:R) requirement means a victim must open the document in Word for exploitation to occur.

Affected Products

Microsoft Office Word (specific versions require Microsoft security advisory confirmation; typically recent versions including Microsoft Word 2016, 2019, Office 365/Microsoft 365 with Word component, and Word for Mac are impacted). CPE would typically include: cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:* and cpe:2.3:a:microsoft:word:*:*:*:*:*:*:*:* with version ranges dependent on patch release. Both 32-bit and 64-bit installations are affected. Legacy Word formats (.doc) and modern OOXML formats (.docx) may both be vulnerable. Users should consult Microsoft Security Update Guide (https://msrc.microsoft.com) for exact affected version ranges and patch availability.

Remediation

Immediate actions: (1) Apply Microsoft security patches as released—check Microsoft Update/Windows Update or Microsoft Security Update Guide for KB numbers associated with CVE-2025-47169; (2) If immediate patching is not possible, implement file-level mitigations: disable macros in Word, use Protected View for opening untrusted documents, and configure AppLocker or Device Guard to restrict Word execution to trusted locations; (3) Deploy mail gateway rules to block .doc/.docx attachments from untrusted senders; (4) User education: warn users not to open Word documents from untrusted sources and enable Real-time protection in Windows Defender. Patch versions and KB numbers will be published in Microsoft Security Advisory and MSRC portal—monitor https://msrc.microsoft.com/update-guide for CVE-2025-47169 specifics.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +39
POC: 0

Share

CVE-2025-47169 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy