PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-30388 Microsoft CVE debrief

CVE-2025-30388 is a high-severity Windows vulnerability affecting Win32K GRFX. Microsoft describes it as a heap-based buffer overflow that could allow an unauthorized attacker to execute code locally. The CVSS vector indicates local access and user interaction are required, but the impact is high because confidentiality, integrity, and availability are all rated high in the supplied record.

Vendor
Microsoft
Product
Microsoft Office for Android
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2025-05-19
Advisory published
2025-05-13
Advisory updated
2025-05-19

Who should care

Windows endpoint and server administrators, Microsoft Office administrators, and security teams responsible for patching supported Windows and Office deployments should prioritize this advisory, especially on systems that match the listed affected Windows versions or Office channels.

Technical summary

The supplied record maps this issue to CWE-787 (out-of-bounds write) with a secondary CWE-122 (heap-based buffer overflow). NVD lists Microsoft as the vendor and includes affected CPEs spanning multiple Windows client and server releases plus certain Microsoft Office builds and Office on macOS/Android entries. The CVSS 3.1 vector is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which reflects local exploitation with user interaction and severe post-exploitation impact if successfully triggered.

Defensive priority

High

Recommended defensive actions

  • Review Microsoft’s advisory for CVE-2025-30388 and apply the latest security updates to affected Windows and Office systems.
  • Prioritize externally exposed, high-value, and user-facing endpoints where user interaction risk is greater.
  • Confirm whether any assets match the affected CPE ranges listed in the NVD record, including supported Windows client/server builds and affected Office versions.
  • Use standard patch validation and change control to verify deployment on Windows and Office fleets.
  • Monitor for abnormal crashes or instability in Win32K-related components on unpatched systems until remediation is complete.

Evidence notes

All claims above are limited to the supplied CVE record and official Microsoft/NVD references. The record states the issue is a heap-based buffer overflow in Windows Win32K - GRFX, that it enables unauthorized local code execution, and that the vulnerability was published on 2025-05-13 and modified on 2025-05-19. NVD also provides the CVSS 3.1 vector, the CWE mappings, the affected CPE criteria, and a Microsoft vendor advisory reference.

Official resources

Published 2025-05-13T17:16:01.903Z; modified 2025-05-19T18:31:38.407Z. No KEV entry was supplied in the source corpus.