CVE-2025-24079
📋 TL;DR
A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code on vulnerable systems by tricking users into opening malicious documents. This affects all users running unpatched versions of Microsoft Word. Successful exploitation requires user interaction to open a specially crafted document.
💻 Affected Systems
- Microsoft Office Word
📦 What is this software?
365 Apps by Microsoft
365 Apps by Microsoft
Office by Microsoft
Office by Microsoft
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Office Long Term Servicing Channel by Microsoft
View all CVEs affecting Office Long Term Servicing Channel →
Word by Microsoft
Word by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's computer, enabling data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local code execution with the privileges of the current user, potentially leading to malware installation, credential theft, or data exfiltration.
If Mitigated
Limited impact with proper security controls like application sandboxing, antivirus detection, and user education preventing malicious document execution.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious document). No public exploit code known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft's monthly security updates for Office
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24079
Restart Required: No
Instructions:
1. Open any Office application. 2. Go to File > Account > Update Options > Update Now. 3. For enterprise deployments, deploy Microsoft's security updates through your patch management system.
🔧 Temporary Workarounds
Disable Word as email editor
WindowsPrevents Word from automatically opening email attachments
Use Microsoft Office Viewer
allOpen documents in read-only mode using Office Viewer instead of full Word
🧯 If You Can't Patch
- Implement application whitelisting to block unauthorized Word documents
- Deploy advanced email filtering to block suspicious attachments
🔍 How to Verify
Check if Vulnerable:
Check Word version against Microsoft's security bulletin. Vulnerable if running unpatched affected versions.
Check Version:
In Word: File > Account > About Word (Windows) or Word > About Word (macOS)
Verify Fix Applied:
Verify Word version matches or exceeds patched version in Microsoft advisory. Test with known safe documents.
📡 Detection & Monitoring
Log Indicators:
- Word crash logs with memory access violations
- Windows Event Logs showing Word process spawning unexpected child processes
Network Indicators:
- Unusual outbound connections from Word process
- DNS requests to suspicious domains after document opening
SIEM Query:
Process creation where parent_process contains 'WINWORD.EXE' AND (process_name contains 'powershell' OR process_name contains 'cmd')