EUVD-2025-17732

| CVE-2025-47167 HIGH
2025-06-10 [email protected]
8.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17732
CVE Published
Jun 10, 2025 - 17:23 nvd
HIGH 8.4

Description

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

Analysis

Type confusion vulnerability in Microsoft Office that allows unauthenticated local attackers to execute arbitrary code with high impact on confidentiality, integrity, and availability. The vulnerability exploits improper resource access due to incompatible type handling, requiring no user interaction or privileges. This is a critical local code execution vector affecting Microsoft Office installations.

Technical Context

The vulnerability stems from CWE-843 (Access of Resource Using Incompatible Type), a memory safety issue where type confusion occurs during resource access operations. In the context of Microsoft Office, this likely involves improper type checking in Office document processing libraries or COM object handling, where the application fails to validate that a resource is of the expected type before accessing it. This can lead to out-of-bounds memory access, use-after-free conditions, or unintended memory corruption. Type confusion vulnerabilities in Office typically manifest in parsing engines, OLE/COM marshaling layers, or Office Open XML (OOXML) processing components. The local attack vector (AV:L) indicates the attacker must have local system access, distinguishing this from remote Office exploits.

Affected Products

Microsoft Office (specific versions and editions not provided in the given data). Based on the CVE description and CWE classification, affected products likely include: Microsoft Word, Microsoft Excel, Microsoft PowerPoint, and Microsoft Office 365 applications. The type confusion vulnerability in document processing suggests impact on all Office editions that process legacy OLE compound documents or OOXML formats. Specific version ranges and CPE strings cannot be definitively stated without access to Microsoft Security Advisories or the official CVE entry with CPE data. Typical CPE patterns for Office would be: cpe:2.3:a:microsoft:office:*:*:*:*:*:windows:*:* and derivative products. Recommended action: consult Microsoft Security Update Guide (aka.ms/SecurityUpdateGuide) and official Microsoft advisories for CVE-2025-47167 for precise version numbers and affected SKUs.

Remediation

Immediate remediation steps: (1) Identify all systems running Microsoft Office and document versions/editions currently deployed. (2) Monitor Microsoft Security Response Center (MSRC) for an official patch release targeting CVE-2025-47167. (3) Once patches are available, prioritize deployment to systems where local access is highest-risk (shared terminals, developer machines, high-user-count systems). (4) Interim mitigations while awaiting patches: restrict local user account creation and login capabilities, implement application whitelisting to prevent unauthorized Office document processing, disable legacy document format support (OLE) if feasible, and enforce endpoint detection and response (EDR) monitoring for suspicious Office process behavior. (5) For Office 365 environments, patches are typically deployed automatically; verify patch status through Microsoft 365 admin portal. (6) Apply patches in sequence: Security Updates > Monthly Quality Updates. (7) Test patches in non-production environments before broad deployment to ensure compatibility with line-of-business applications and Office macros/add-ins. Contact Microsoft Support (support.microsoft.com) or your Microsoft account representative for CVE-2025-47167-specific guidance.

Priority Score

42
Low Medium High Critical
KEV: 0
EPSS: +0.5
CVSS: +42
POC: 0

Share

EUVD-2025-17732 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy