CVE-2025-24077
Published: 11 March 2025
Summary
CVE-2025-24077 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 41.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the use-after-free vulnerability in Microsoft Office Word through timely patching to prevent local code execution.
Implements memory safeguards like DEP and ASLR to block unauthorized code execution from use-after-free exploits in Word.
Deploys malicious code protection mechanisms to scan and prevent execution of malicious Office documents exploiting the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in Microsoft Word enables arbitrary code execution via crafted malicious document opened by user, directly mapping to Exploitation for Client Execution.
NVD Description
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Deeper analysisAI
CVE-2025-24077 is a use-after-free vulnerability (CWE-416) affecting Microsoft Office Word. Published on 2025-03-11, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The flaw enables an unauthorized attacker to execute code locally on a victim's machine.
Exploitation requires local access to the target system and user interaction, such as opening a malicious document, with low attack complexity and no special privileges needed from the attacker. Successful exploitation grants high-impact arbitrary code execution, compromising confidentiality, integrity, and availability.
The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24077 details mitigation steps and available patches.
Details
- CWE(s)