Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-53783

Опубликовано: 12 авг. 2025
Источник: msrc
CVSS3: 7.5
EPSS Низкий

Описание

Microsoft Teams Remote Code Execution Vulnerability

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.

Обновления

ПродуктСтатьяОбновление
Microsoft Teams for iOS
Microsoft Teams for Android
Microsoft Teams for Desktop
Microsoft Teams for Mac
-
Teams for D365 Remote Assist HoloLens
-
Teams for D365 Guides Hololens
-
Teams Panels
-
Teams Phones
-

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 24%
0.00078
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
3 месяца назад

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.

CVSS3: 7.5
github
3 месяца назад

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.

CVSS3: 7.5
fstec
3 месяца назад

Уязвимость корпоративной платформы Microsoft Teams, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 24%
0.00078
Низкий

7.5 High

CVSS3