CVE-2025-62562

CWE-416Use After Free7 documents6 sources
Severity
7.8HIGH
EPSS
0.1%
top 65.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

Use after free in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages13 packages

CVEListV5microsoft/microsoft_office_201919.0.0https://aka.ms/OfficeSecurityReleases
CVEListV5microsoft/microsoft_office_ltsc_202116.0.1https://aka.ms/OfficeSecurityReleases
CVEListV5microsoft/microsoft_office_ltsc_202416.0.0https://aka.ms/OfficeSecurityReleases
CVEListV5microsoft/microsoft_office_ltsc_for_mac_202116.0.116.104.25121423
CVEListV5microsoft/microsoft_office_ltsc_for_mac_202416.0.016.104.25121423

🔴Vulnerability Details

2
CVEList
Microsoft Outlook Remote Code Execution Vulnerability2025-12-09
GHSA
GHSA-hjmx-69j9-2mm2: Use after free in Microsoft Office Outlook allows an unauthorized attacker to execute code locally2025-12-09

📋Vendor Advisories

1
Microsoft
Microsoft Outlook Remote Code Execution Vulnerability2025-12-09

🕵️Threat Intelligence

1
Wiz
CVE-2025-62562 Impact, Exploitability, and Mitigation Steps | Wiz