Cyber Posture

CVE-2025-49696

High

Published: 08 July 2025

Published
08 July 2025
Modified
15 July 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0080 74.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-49696 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 25.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and timely patching of known flaws like this out-of-bounds read vulnerability in Microsoft Office.

prevent

Implements memory safeguards such as ASLR and DEP that prevent exploitation of heap-based buffer overflow vulnerabilities leading to local code execution.

detect

Ensures receipt of vendor security advisories like Microsoft's update guide for CVE-2025-49696 to enable prompt flaw remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Out-of-bounds read/heap overflow in Office enabling local unauthenticated code execution directly facilitates T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.

Deeper analysisAI

CVE-2025-49696 is an out-of-bounds read vulnerability affecting Microsoft Office, mapped to CWE-122 (Heap-based Buffer Overflow) and CWE-125 (Out-of-bounds Read). Published on 2025-07-08, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue enables an unauthorized attacker to execute code locally on the affected system.

A local attacker can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. Upon successful exploitation, the attacker achieves high-impact effects, gaining unauthorized code execution that fully compromises confidentiality, integrity, and availability on the local system.

Microsoft's update guide provides details on mitigation and patches for CVE-2025-49696, available at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49696. Security practitioners should consult this advisory for deployment instructions.

Details

CWE(s)

Affected Products

microsoft
365 apps
all versions
microsoft
office
2016, 2019, all versions
microsoft
office long term servicing channel
2021, 2024

CVEs Like This One

CVE-2025-54910Same product: Microsoft 365 Apps
CVE-2026-20953Same product: Microsoft 365 Apps
CVE-2025-24057Same product: Microsoft 365 Apps
CVE-2025-21356Same product: Microsoft 365 Apps
CVE-2026-20944Same product: Microsoft 365 Apps
CVE-2026-20952Same product: Microsoft 365 Apps
CVE-2025-62557Same product: Microsoft 365 Apps
CVE-2026-26113Same product: Microsoft 365 Apps
CVE-2025-21395Same product: Microsoft 365 Apps
CVE-2026-21509Same product: Microsoft 365 Apps

References