CVE-2025-53783: Microsoft Teams Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.5)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Aug
Released
2025-08-12
Last Updated
2025-10-30
EPSS Score
0.08% (percentile: 24.6%)

Description

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.

Detection & Weaponization (1 sources)

Maturity: Exploit

  • GitHub PoC: 1 repositories

Affected Products (8)

Device

  • Teams for D365 Remote Assist HoloLens
  • Teams Panels
  • Teams Phones
  • Teams for D365 Guides Hololens

Microsoft Office

  • Microsoft Teams for Android
  • Microsoft Teams for iOS
  • Microsoft Teams for Desktop
  • Microsoft Teams for Mac, New Edition

Security Updates (3)

Acknowledgments

Anonymous working with Trend Zero Day Initiative

Revision History

  • 2025-08-12: Information published.
  • 2025-10-30: Updated product information in the Software Update table. This is an informational change only.