CVE-2025-54910
Published: 09 September 2025
Summary
CVE-2025-54910 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 28.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the heap-based buffer overflow in Microsoft Office by requiring timely identification, testing, and installation of vendor patches.
Implements memory protection mechanisms like ASLR and DEP to prevent arbitrary code execution resulting from the heap buffer overflow.
Monitors and scans for vulnerabilities such as CVE-2025-54910 in Microsoft Office to identify affected systems for remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in local Microsoft Office component directly enables arbitrary code execution without privileges or interaction, mapping to local privilege escalation via exploitation.
NVD Description
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
Deeper analysisAI
CVE-2025-54910 is a heap-based buffer overflow vulnerability (CWE-122) affecting Microsoft Office. Published on 2025-09-09, it has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw enables an unauthorized attacker to execute arbitrary code locally by triggering the buffer overflow.
An attacker with local access to the affected system can exploit this vulnerability with low complexity and no privileges or user interaction required. Successful exploitation allows the attacker to achieve high-impact confidentiality, integrity, and availability effects, potentially leading to full local code execution under the context of the Office application.
The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54910 provides details on mitigation and available patches.
Details
- CWE(s)