Cyber Posture

CVE-2025-47994

High

Published: 08 July 2025

Published
08 July 2025
Modified
15 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0141 80.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47994 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Microsoft Office. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked in the top 19.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of flaws, including applying vendor patches for the deserialization vulnerability in Microsoft Office to prevent exploitation.

prevent

Establishes secure configuration settings for Microsoft Office, such as enabling Protected View to sandbox untrusted documents and mitigate deserialization attacks.

preventdetect

Deploys malicious code protection mechanisms like antivirus and EDR to scan, block, or detect Office files exploiting the deserialization vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Deserialization vulnerability in Office enables arbitrary code execution/privilege escalation via malicious file opened by user (T1204.002) and direct exploitation for local privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2025-47994 is a deserialization of untrusted data vulnerability (CWE-502) affecting Microsoft Office. Published on 2025-07-08, it has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

A local unauthorized attacker (PR:N) can exploit this vulnerability with low attack complexity (AC:L), but it requires user interaction (UI:R), such as opening a malicious file. Successful exploitation allows privilege escalation on the local system, enabling high-level control over the affected machine without changing the scope of impact (S:U).

The Microsoft Security Response Center (MSRC) provides details on mitigation and patches in its update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47994.

Details

CWE(s)

Affected Products

microsoft
365 apps
all versions
microsoft
office
2016, 2019
microsoft
office long term servicing channel
2021, 2024
microsoft
sharepoint enterprise server
2016

CVEs Like This One

CVE-2025-21364Same product: Microsoft 365 Apps
CVE-2025-54910Same product: Microsoft 365 Apps
CVE-2026-21511Same product: Microsoft 365 Apps
CVE-2025-49696Same product: Microsoft 365 Apps
CVE-2025-21356Same product: Microsoft 365 Apps
CVE-2026-20953Same product: Microsoft 365 Apps
CVE-2025-21345Same product: Microsoft 365 Apps
CVE-2025-21392Same product: Microsoft 365 Apps
CVE-2025-24057Same product: Microsoft 365 Apps
CVE-2025-21346Same product: Microsoft 365 Apps

References