Cyber Posture

CVE-2025-21338

High

Published: 14 January 2025

Published
14 January 2025
Modified
21 January 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0053 67.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-21338 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Microsoft Office. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 32.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the GDI+ RCE vulnerability by requiring timely identification, reporting, and patching of the specific flaw as detailed in Microsoft's advisory.

prevent

Implements memory protection technologies like ASLR and DEP that directly counter memory corruption exploits such as the CWE-190 integer overflow in GDI+ leading to RCE.

prevent

Enforces least privilege to limit the scope and impact of arbitrary code execution by a low-privileged local attacker exploiting the GDI+ vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The CVE describes a local arbitrary code execution vulnerability (integer overflow in GDI+) in a client graphics component, directly enabling exploitation for code execution in client applications without user interaction.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

GDI+ Remote Code Execution Vulnerability

Deeper analysisAI

CVE-2025-21338 is a GDI+ Remote Code Execution vulnerability, published on 2025-01-14, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). It is associated with CWE-190 and affects the GDI+ graphics component in Microsoft Windows systems.

The vulnerability can be exploited by a local attacker who has low privileges on the target system. Exploitation requires low complexity and no user interaction, allowing the attacker to execute arbitrary code in the context of the affected process, with high impacts on confidentiality, integrity, and availability.

Microsoft's advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338 provides details on patches and mitigation steps for addressing this vulnerability.

Details

CWE(s)

Affected Products

microsoft
office
2021, 2024 · ≤ 2.93.24123014 · ≤ 16.0.14326.22175 · ≤ 16.0.18429.20000
microsoft
windows 10 1507
≤ 10.0.10240.20890 · ≤ 10.0.10240.20890
microsoft
windows 10 1607
≤ 10.0.14393.7699 · ≤ 10.0.14393.7699
microsoft
windows 10 1809
≤ 10.0.17763.6775 · ≤ 10.0.17763.6775
microsoft
windows 10 21h2
≤ 10.0.19044.5371
microsoft
windows 10 22h2
≤ 10.0.19045.5371
microsoft
windows 11 22h2
≤ 10.0.22621.4751
microsoft
windows 11 23h2
≤ 10.0.22631.4751
microsoft
windows 11 24h2
≤ 10.0.26100.2894
microsoft
windows server 2008
all versions, r2
+6 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-21244Same product: Microsoft Windows 10 1507
CVE-2025-21243Same product: Microsoft Windows 10 1507
CVE-2025-21266Same product: Microsoft Windows 10 1507
CVE-2025-21201Same product: Microsoft Windows 10 1507
CVE-2025-21407Same product: Microsoft Windows 10 1507
CVE-2025-21303Same product: Microsoft Windows 10 1507
CVE-2025-21339Same product: Microsoft Windows 10 1507
CVE-2025-21233Same product: Microsoft Windows 10 1507
CVE-2025-21371Same product: Microsoft Windows 10 1507
CVE-2025-21409Same product: Microsoft Windows 10 1507

References