Cyber Posture

CVE-2025-24057

High

Published: 11 March 2025

Published
11 March 2025
Modified
02 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0021 42.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-24057 is a heap-based buffer overflow vulnerability (CWE-122) affecting Microsoft Office. Published on 2025-03-11T17:16:28.390, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The issue enables an unauthorized attacker to execute code locally via malformed input processed by the software.

Exploitation requires local access to the target system with low attack complexity and no privileges, but user interaction is necessary, such as opening a specially crafted Office file. A successful attack grants the attacker arbitrary code execution on the local machine, resulting in high impacts to confidentiality, integrity, and availability.

The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24057 provides details on mitigation and available patches.

Details

CWE(s)
CWE-122

Affected Products

microsoft
365 apps
all versions
microsoft
office
2016, 2019
microsoft
office long term servicing channel
2021, 2024

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Heap-based buffer overflow in Microsoft Office enables arbitrary code execution when a user opens a specially crafted malicious file, directly mapping to client-side exploitation (T1203) and user execution via malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References