CVE-2025-49695
Published: 08 July 2025
Summary
CVE-2025-49695 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 25.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely patching and remediation of the use-after-free flaw in Microsoft Office to prevent arbitrary code execution.
Implements memory protection mechanisms that mitigate exploitation of use-after-free vulnerabilities by safeguarding against unauthorized memory access and modification.
Enables vulnerability scanning and monitoring to identify the CVE-2025-49695 flaw in Microsoft Office for subsequent remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in Microsoft Office directly enables arbitrary code execution via client application exploitation (T1203).
NVD Description
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Deeper analysisAI
CVE-2025-49695 is a use-after-free vulnerability (CWE-416) affecting Microsoft Office. Published on 2025-07-08T17:15:55.697, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
An unauthorized local attacker can exploit this vulnerability with low complexity and no privileges or user interaction required. Successful exploitation allows arbitrary code execution on the affected system.
The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49695 provides guidance on mitigation and available patches.
Details
- CWE(s)