9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.746 High
EPSS
Percentile
98.1%
10/11/2016
High
An improper RTF handling was found in Microsoft Office. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely via a specially designed file.
Microsoft Word 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2
Microsoft Word 2013 Service Pack 1
Microsoft Office 2013 RT Service Pack 1
Microsoft Word 2016
Microsoft Word for Mac 2011
Microsoft Word 2016 for Mac
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Word Viewer
SharePoint Server 2010 Service Pack 2
SharePoint Server 2013 Service Pack 1
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Web Apps 2013 Service Pack 1
Office Online Server
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2016-3263
CVE-2016-3209
CVE-2016-3262
CVE-2016-7182
CVE-2016-3396
CVE-2016-7193
ACE
CVE-2016-32635.0Warning
CVE-2016-32095.0Warning
CVE-2016-32625.0Warning
CVE-2016-33969.3Critical
CVE-2016-71939.3Critical
3118394
3189647
3118348
3118317
3188399
3188397
3118327
3188400
3118301
3127898
3193438
3118331
3127897
3118360
3118307
3118311
3193442
3118312
3118377
3118384
3118352
3118308
3118345
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
support.microsoft.com/kb/3118301
support.microsoft.com/kb/3118307
support.microsoft.com/kb/3118308
support.microsoft.com/kb/3118311
support.microsoft.com/kb/3118312
support.microsoft.com/kb/3118317
support.microsoft.com/kb/3118327
support.microsoft.com/kb/3118331
support.microsoft.com/kb/3118345
support.microsoft.com/kb/3118348
support.microsoft.com/kb/3118352
support.microsoft.com/kb/3118360
support.microsoft.com/kb/3118377
support.microsoft.com/kb/3118384
support.microsoft.com/kb/3118394
support.microsoft.com/kb/3127897
support.microsoft.com/kb/3127898
support.microsoft.com/kb/3188397
support.microsoft.com/kb/3188399
support.microsoft.com/kb/3188400
support.microsoft.com/kb/3189647
support.microsoft.com/kb/3193438
support.microsoft.com/kb/3193442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3262
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3263
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7193
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3209
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3262
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3263
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3396
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7182
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7193
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.746 High
EPSS
Percentile
98.1%