CVE-2025-24075
Published: 11 March 2025
Summary
CVE-2025-24075 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 41.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely remediation of flaws such as the Excel buffer overflow via vendor patches, directly eliminating the vulnerability.
SI-16 implements memory protections like DEP and stack canaries that prevent arbitrary code execution from stack-based buffer overflows in Excel.
SI-3 deploys malicious code protection mechanisms that scan and block specially crafted Excel files before user interaction enables exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in Excel enables arbitrary code execution via opening a malicious file, directly mapping to client-side vulnerability exploitation and user execution of malicious files.
NVD Description
Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Deeper analysisAI
CVE-2025-24075 is a stack-based buffer overflow vulnerability (CWE-121) affecting Microsoft Office Excel. Published on 2025-03-11T17:16:30.270, it allows an unauthorized attacker to execute code locally and carries a CVSS 3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Exploitation requires local access to the target system (AV:L) with low attack complexity (AC:L) and no privileges (PR:N), but user interaction is necessary (UI:R), such as opening a specially crafted Excel file. Successful exploitation enables arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the local scope (S:U).
The Microsoft Security Response Center has published an update guide with mitigation details at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24075.
Details
- CWE(s)