Lucene search

K
cve[email protected]CVE-2022-34717
HistoryAug 09, 2022 - 8:15 p.m.

CVE-2022-34717

2022-08-0920:15:11
web.nvd.nist.gov
128
3
microsoft
office
remote code execution
vulnerability
cve-2022-34717
nvd

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.9%

Microsoft Office Remote Code Execution Vulnerability

Affected configurations

Vulners
NVD
Node
microsoftmicrosoft_office_2019Match19.0.0
OR
microsoft365_appsMatch16.0.1
OR
microsoftmicrosoft_office_ltsc_2021Match16.0.1
OR
microsoftmicrosoft_office_2016Range16.0.016.0.14931.20612
OR
microsoftofficeRange15.0.02013service
VendorProductVersionCPE
microsoftmicrosoft_office_201919.0.0cpe:2.3:a:microsoft:microsoft_office_2019:19.0.0:*:*:*:*:*:*:*
microsoft365_apps16.0.1cpe:2.3:a:microsoft:365_apps:16.0.1:*:*:*:*:*:*:*
microsoftmicrosoft_office_ltsc_202116.0.1cpe:2.3:a:microsoft:microsoft_office_ltsc_2021:16.0.1:*:*:*:*:*:*:*
microsoftmicrosoft_office_2016*cpe:2.3:a:microsoft:microsoft_office_2016:*:*:*:*:*:*:*:*
microsoftoffice*cpe:2.3:a:microsoft:office:*:*:*:*:service:*:*:*

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": "Microsoft Office 2019",
    "cpes": [
      "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "32-bit Systems",
      "x64-based Systems"
    ],
    "versions": [
      {
        "version": "19.0.0",
        "lessThan": "https://aka.ms/OfficeSecurityReleases",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft 365 Apps for Enterprise",
    "cpes": [
      "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"
    ],
    "platforms": [
      "x64-based Systems",
      "32-bit Systems"
    ],
    "versions": [
      {
        "version": "16.0.1",
        "lessThan": "https://aka.ms/OfficeSecurityReleases",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Office LTSC 2021",
    "cpes": [
      "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "x64-based Systems",
      "32-bit Systems"
    ],
    "versions": [
      {
        "version": "16.0.1",
        "lessThan": "https://aka.ms/OfficeSecurityReleases",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Office 2016",
    "cpes": [
      "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
      "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*"
    ],
    "platforms": [
      "x64-based Systems",
      "32-bit Systems"
    ],
    "versions": [
      {
        "version": "16.0.0",
        "lessThan": "16.0.14931.20612",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Office 2013 Service Pack 1",
    "cpes": [
      "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
      "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*",
      "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*"
    ],
    "platforms": [
      "ARM64-based Systems",
      "x64-based Systems",
      "32-bit Systems"
    ],
    "versions": [
      {
        "version": "15.0.0",
        "lessThan": "15.0.5475.1001",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  }
]

Social References

More

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.9%