First published: Tue Mar 11 2025(Updated: )
<p>Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office LTSC 2021 | ||
Microsoft Excel 2016 Click-to-Run (C2R) | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Excel 2016 Click-to-Run (C2R) | ||
Microsoft 365 Apps for enterprise | ||
Microsoft Office LTSC 2024 | ||
Microsoft 365 Apps for enterprise | ||
Microsoft Office Online Server | ||
Microsoft Office 2019 for Mac |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24081 has a severity rating that indicates it allows for remote code execution due to a use after free vulnerability in Microsoft Office Excel.
To fix CVE-2025-24081, you should update your Microsoft Office Excel to the latest version through the official patch released by Microsoft.
CVE-2025-24081 affects multiple versions of Microsoft Excel, including Office LTSC 2021, Excel 2016, and various editions of Office for Mac.
An attacker can execute arbitrary code locally on a vulnerable system as a result of CVE-2025-24081.
There is no official workaround for CVE-2025-24081; applying the latest security updates is recommended to mitigate the risk.