Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office OneNote can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Access can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft AutoUpdate (MAU) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2025-21356
- CVE-2025-21345
- CVE-2025-21344
- CVE-2025-21364
- CVE-2025-21402
- CVE-2025-21393
- CVE-2025-21348
- CVE-2025-21346
- CVE-2025-21362
- CVE-2025-21395
- CVE-2025-21360
- CVE-2025-21361
- CVE-2025-21338
- CVE-2025-21357
- CVE-2025-21366
- CVE-2025-21365
- CVE-2025-21363
- CVE-2025-21186
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2025-21338 critical
- CVE-2025-21354 critical
- CVE-2025-21356 critical
- CVE-2025-21345 critical
- CVE-2025-21344 critical
- CVE-2025-21364 critical
- CVE-2025-21402 critical
- CVE-2025-21393 high
- CVE-2025-21348 high
- CVE-2025-21346 critical
- CVE-2025-21362 critical
- CVE-2025-21395 critical
- CVE-2025-21360 critical
- CVE-2025-21361 critical
- CVE-2025-21357 high
- CVE-2025-21366 critical
- CVE-2025-21365 critical
- CVE-2025-21363 critical
- CVE-2025-21186 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!