- Description
- Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.4
- Impact score
- 5.9
- Exploitability score
- 2.5
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-416
- Hype score
- Not currently trending
CVE-2025-49695 no Microsoft Office permitia injeção de código via arquivo malicioso, descoberta no Pwn2Own Berlin. Combinar essa RCE com bypass de autenticação permitia execução remota pela rede em servidores SharePoint sem interação do usuário.
@hashtagsec
10 Jul 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49695 Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. https://t.co/dfgfUwE71Z
@CVEnew
8 Jul 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378"
},
{
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF"
},
{
"criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:android:*:*",
"vulnerable": true,
"matchCriteriaId": "DD6ED53F-7197-439D-A458-0DF13E16AE91"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "72324216-4EB3-4243-A007-FEF3133C7DF9"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "0FBB0E61-7997-4F26-9C07-54912D3F1C10"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA"
},
{
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
"vulnerable": true,
"matchCriteriaId": "851BAC4E-9965-4F40-9A6C-B73D9004F4C1"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
"vulnerable": true,
"matchCriteriaId": "23B2FA23-76F4-4D83-A718-B8D04D7EA37B"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
"vulnerable": true,
"matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
"vulnerable": true,
"matchCriteriaId": "D31E509A-0B2E-4B41-88C4-0099E800AFE6"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
"vulnerable": true,
"matchCriteriaId": "017A7041-BEF1-4E4E-AC8A-EFC6AFEB01FE"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
"vulnerable": true,
"matchCriteriaId": "EF3E56B5-E6A6-4061-9380-D421E52B9199"
}
],
"operator": "OR"
}
]
}
]