CVE-2025-54906 (CNNVD-202509-1296)

HIGH
中文标题:
Microsoft Office 资源管理错误漏洞
英文标题:
Microsoft Office Remote Code Execution Vulnerability
CVSS分数: 7.8
发布时间: 2025-09-09 17:00:57
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Microsoft Office是美国微软(Microsoft)公司的一款办公软件套件产品。该产品常用组件包括Word、Excel、Access、Powerpoint、FrontPage等。 Microsoft Office存在资源管理错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Microsoft SharePoint Enterprise Server 2016,Microsoft SharePoint Server 2019,Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise for 64-bit Systems,Microsoft Office LTSC for Mac 2021,Microsoft Office LTSC 2021 for 64-bit editions,Microsoft Office LTSC 2021 for 32-bit editions,Microsoft Office LTSC 2024 for 32-bit editions,Microsoft Office LTSC 2024 for 64-bit editions,Microsoft Office LTSC for Mac 2024,Microsoft Office 2016 (32-bit edition),Microsoft Office 2016 (64-bit edition)。

英文描述:

NOT_EXTRACTED

CWE类型:
CWE-416
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Microsoft SharePoint Enterprise Server 2016 - < 16.0.5517.1000 - cpe:2.3:a:microsoft:microsoft_sharepoint_enterprise_server_2016:*:*:*:*:*:*:*:*
Microsoft Microsoft SharePoint Server 2019 - < 16.0.10417.20047 - cpe:2.3:a:microsoft:microsoft_sharepoint_server_2019:*:*:*:*:*:*:*:*
Microsoft Microsoft Office 2019 - < https://aka.ms/OfficeSecurityReleases - cpe:2.3:a:microsoft:microsoft_office_2019:*:*:*:*:*:*:*:*
Microsoft Microsoft 365 Apps for Enterprise - < https://aka.ms/OfficeSecurityReleases - cpe:2.3:a:microsoft:microsoft_365_apps_for_enterprise:*:*:*:*:*:*:*:*
Microsoft Microsoft Office LTSC for Mac 2021 - < 16.101.25091314 - cpe:2.3:a:microsoft:microsoft_office_ltsc_for_mac_2021:*:*:*:*:*:*:*:*
Microsoft Microsoft Office LTSC 2021 - < https://aka.ms/OfficeSecurityReleases - cpe:2.3:a:microsoft:microsoft_office_ltsc_2021:*:*:*:*:*:*:*:*
Microsoft Microsoft Office LTSC 2024 - < https://aka.ms/OfficeSecurityReleases - cpe:2.3:a:microsoft:microsoft_office_ltsc_2024:*:*:*:*:*:*:*:*
Microsoft Microsoft Office LTSC for Mac 2024 - < 16.101.25091314 - cpe:2.3:a:microsoft:microsoft_office_ltsc_for_mac_2024:*:*:*:*:*:*:*:*
Microsoft Microsoft Office 2016 - < 16.0.5517.1000 - cpe:2.3:a:microsoft:microsoft_office_2016:*:*:*:*:*:*:*:*
microsoft 365_apps - - - cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
microsoft office 2016 - - cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*
microsoft office 2019 - - cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*
microsoft office_long_term_servicing_channel 2021 - - cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*
microsoft office_long_term_servicing_channel 2024 - - cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
microsoft sharepoint_server 2016 - - cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
microsoft sharepoint_server 2019 - - cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
Microsoft Office Remote Code Execution Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
7.8
CVSS向量: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-09-09 17:00:57
修改时间:
2025-09-25 23:10:40
创建时间:
2025-11-11 15:40:43
更新时间:
2025-11-11 16:00:09
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-54906 2025-11-11 15:23:29 2025-11-11 07:40:43
NVD nvd_CVE-2025-54906 2025-11-11 15:01:02 2025-11-11 07:48:30
CNNVD cnnvd_CNNVD-202509-1296 2025-11-11 15:12:56 2025-11-11 08:00:09
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:09
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-202509-1296; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-202509-1296
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:30
affected_products_count: 9 → 16; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 9 -> 16
  • data_sources: ['cve'] -> ['cve', 'nvd']