CVE-2025-32704

8.4 HIGH

📋 TL;DR

A buffer over-read vulnerability in Microsoft Office Excel allows attackers to read beyond allocated memory boundaries, potentially leading to information disclosure or remote code execution. This affects users who open malicious Excel files with vulnerable versions of Microsoft Office. The vulnerability requires user interaction to open a specially crafted file.

💻 Affected Systems

Products:
  • Microsoft Office Excel
  • Microsoft 365 Apps
  • Microsoft Office LTSC
Versions: Specific versions as listed in Microsoft Security Update Guide
Operating Systems: Windows 10, Windows 11, Windows Server 2016+, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Excel versions are vulnerable. Microsoft 365 auto-updates may mitigate if patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM privileges leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Information disclosure through memory leaks, potentially exposing sensitive data or credentials stored in memory.

🟢

If Mitigated

Limited impact with proper application sandboxing and memory protection mechanisms in place.

🌐 Internet-Facing: MEDIUM - Requires user to download and open malicious file, but could be delivered via email or web downloads.
🏢 Internal Only: HIGH - Internal users frequently share Excel files, increasing the attack surface for phishing campaigns.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious Excel file. Exploit development requires understanding of Excel file format and memory layout.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific version numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704

Restart Required: Yes

Instructions:

1. Open any Office application. 2. Go to File > Account > Update Options > Update Now. 3. Restart Office applications when prompted. 4. For enterprise deployments, deploy through Microsoft Endpoint Configuration Manager or WSUS.

🔧 Temporary Workarounds

Block Excel file types via Group Policy

windows

Prevent opening of Excel files from untrusted sources

gpedit.msc > User Configuration > Administrative Templates > Windows Components > Attachment Manager > 'Do not preserve zone information' = Disabled

Enable Protected View

windows

Force Excel files from internet to open in Protected View

File > Options > Trust Center > Trust Center Settings > Protected View > Enable all Protected View options

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Excel execution
  • Deploy email filtering to block Excel attachments from external sources

🔍 How to Verify

Check if Vulnerable:

Check Excel version via File > Account > About Excel and compare with patched versions in Microsoft advisory

Check Version:

powershell Get-ItemProperty "HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object {$_.DisplayName -like "*Office*"} | Select-Object DisplayName, DisplayVersion

Verify Fix Applied:

Verify Office updates installed via Control Panel > Programs > Programs and Features > View installed updates

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) for Excel with suspicious parent processes
  • Office crash reports in Windows Event Log

Network Indicators:

  • Unusual outbound connections from Excel process
  • DNS requests to suspicious domains after Excel launch

SIEM Query:

source="windows" event_id=4688 process_name="EXCEL.EXE" | stats count by parent_process_name

🔗 References

📤 Share & Export