CVE-2025-47175 Overview
CVE-2025-47175 is a Use After Free (UAF) vulnerability in Microsoft Office PowerPoint that enables an unauthorized attacker to execute arbitrary code locally. This memory corruption flaw occurs when the application improperly handles memory operations, allowing an attacker to manipulate freed memory regions and potentially gain control of program execution flow.
Critical Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary code with the privileges of the current user. If the user has administrative rights, the attacker could gain complete control of the affected system, install programs, view or modify data, or create new accounts with full user rights.
Affected Products
- Microsoft 365 Apps for Enterprise
- Microsoft Office 2019
- Microsoft Office LTSC 2021 (Windows and macOS)
- Microsoft Office LTSC 2024 (Windows and macOS)
- Microsoft PowerPoint 2016
Discovery Timeline
- June 10, 2025 - CVE-2025-47175 published to NVD
- July 9, 2025 - Last updated in NVD database
Technical Details for CVE-2025-47175
Vulnerability Analysis
This vulnerability is classified as CWE-416 (Use After Free), a critical memory safety issue that occurs when a program continues to use a pointer after the memory it references has been freed. In the context of Microsoft PowerPoint, this flaw can be triggered when processing specially crafted presentation files.
Use After Free vulnerabilities are particularly dangerous because they can lead to various exploitation scenarios including arbitrary code execution, information disclosure, or denial of service. When memory is freed but a pointer to that memory is retained and subsequently dereferenced, the application may access memory that has been reallocated for a different purpose, leading to undefined and potentially exploitable behavior.
The local attack vector requires user interaction, meaning an attacker must convince a user to open a malicious PowerPoint file. This could be achieved through social engineering techniques such as phishing emails with malicious attachments or hosting the file on a compromised website.
Root Cause
The root cause of CVE-2025-47175 lies in improper memory management within Microsoft PowerPoint's document parsing engine. When certain objects within a PowerPoint presentation are processed, the application may free memory associated with an object while retaining a dangling pointer to that memory region. Subsequent operations that reference this pointer can then access the freed memory, leading to potential code execution.
This type of vulnerability typically arises from complex object lifecycle management, where the timing and order of object creation, modification, and destruction are not properly synchronized. The freed memory may be reallocated for attacker-controlled data, which can then be used to redirect program execution to malicious code.
Attack Vector
The attack requires local access and user interaction to exploit. An attacker would need to craft a malicious PowerPoint presentation file (.pptx, .ppt, .ppsx, or similar formats) containing specific elements designed to trigger the use-after-free condition. The attack scenario typically involves:
- The attacker creates a specially crafted PowerPoint file containing malformed objects or sequences designed to trigger the memory corruption
- The victim receives the malicious file through email, download, or file sharing
- When the victim opens the file in a vulnerable version of PowerPoint, the application processes the malicious content
- The use-after-free condition is triggered, allowing the attacker to execute arbitrary code in the context of the current user
The vulnerability does not require elevated privileges to exploit, but successful exploitation grants the attacker the same permissions as the logged-in user. For detailed technical information and patch guidance, refer to the Microsoft CVE-2025-47175 Advisory.
Detection Methods for CVE-2025-47175
Indicators of Compromise
- Unexpected PowerPoint crashes or application hangs when opening presentation files from unknown sources
- Suspicious child processes spawned by POWERPNT.exe that are not typical for normal PowerPoint operations
- Anomalous memory access patterns or exception handlers being triggered during file parsing
- Presence of unusually crafted .pptx, .ppt, .ppsx, or .potx files in email attachments or download folders
Detection Strategies
- Deploy endpoint detection and response (EDR) solutions capable of monitoring for suspicious behavior from Microsoft Office applications
- Implement application control policies to alert on or block unusual child process creation from PowerPoint
- Configure email security gateways to scan and sandbox PowerPoint attachments before delivery
- Monitor for exploitation attempts using behavioral analysis that detects memory corruption exploitation techniques
Monitoring Recommendations
- Enable enhanced logging for Microsoft Office applications to capture detailed event information
- Monitor for suspicious file operations involving PowerPoint file formats from untrusted sources
- Implement network monitoring to detect potential command and control communications following successful exploitation
- Configure SentinelOne Singularity Platform to detect and block use-after-free exploitation attempts targeting Office applications
How to Mitigate CVE-2025-47175
Immediate Actions Required
- Apply the latest Microsoft security updates for all affected Office products immediately
- Implement Protected View settings to open files from the Internet and other potentially unsafe locations in read-only mode
- Enable Application Guard for Office where available to isolate potentially malicious documents
- Educate users about the risks of opening PowerPoint files from untrusted sources
Patch Information
Microsoft has released security updates to address this vulnerability. Organizations should apply patches through Windows Update, Microsoft Update Catalog, or enterprise deployment tools such as WSUS or Configuration Manager. Verify that all affected products listed above are updated to the latest security release. For detailed patch information and download links, refer to the Microsoft CVE-2025-47175 Advisory.
Workarounds
- Configure Microsoft Office to open files from untrusted locations in Protected View only
- Use Attack Surface Reduction (ASR) rules to block Office applications from creating child processes
- Implement strict email filtering policies to quarantine PowerPoint attachments from external sources
- Consider deploying Office in a virtualized or sandboxed environment for high-risk users
# Enable Protected View via Group Policy (PowerShell example)
# Configure registry settings to enforce Protected View for Internet files
Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\PowerPoint\Security\ProtectedView" -Name "DisableInternetFilesInPV" -Value 0 -Type DWord
Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\PowerPoint\Security\ProtectedView" -Name "DisableAttachmentsInPV" -Value 0 -Type DWord
Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\PowerPoint\Security\ProtectedView" -Name "DisableUnsafeLocationsInPV" -Value 0 -Type DWord
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


