7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.955 High
EPSS
Percentile
99.4%
05/09/2017
Critical
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code and gain privileges.
Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2
Microsoft Office 2013 Service Pack 1
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2016
Microsoft Office 2016 for Mac
Microsoft Office Enterprise Server 2016
Microsoft Word 2007 Service Pack 3
Microsoft Word 2010 Service Pack 2
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2013 Service Pack 1
Microsoft PowerPoint for Mac 2011
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Office Word Viewer
Skype for Business 2016
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2017-0261
CVE-2017-0262
CVE-2017-0265
CVE-2017-0264
CVE-2017-0281
CVE-2017-0254
CVE-2017-0255
CVE-2017-0281
CVE-2017-0265
CVE-2017-0264
CVE-2017-0262
CVE-2017-0261
CVE-2017-0255
CVE-2017-0254
ACE
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats
CVE-2017-02819.3Critical
CVE-2017-02659.3Critical
CVE-2017-02649.3Critical
CVE-2017-02629.3Critical
CVE-2017-02619.3Critical
CVE-2017-02553.5Warning
CVE-2017-02549.3Critical
3191841
3191835
3191904
3191888
3191909
3191880
3191836
3191843
3178729
3191865
3162040
3191839
3118310
3172458
3114375
3191895
2596904
3191899
3191885
3191863
3191881
3191890
3191913
3191858
3191914
3191915
3212221
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
support.microsoft.com/kb/2596904
support.microsoft.com/kb/3114375
support.microsoft.com/kb/3118310
support.microsoft.com/kb/3162040
support.microsoft.com/kb/3172458
support.microsoft.com/kb/3178729
support.microsoft.com/kb/3191835
support.microsoft.com/kb/3191836
support.microsoft.com/kb/3191839
support.microsoft.com/kb/3191841
support.microsoft.com/kb/3191843
support.microsoft.com/kb/3191858
support.microsoft.com/kb/3191863
support.microsoft.com/kb/3191865
support.microsoft.com/kb/3191880
support.microsoft.com/kb/3191881
support.microsoft.com/kb/3191885
support.microsoft.com/kb/3191888
support.microsoft.com/kb/3191890
support.microsoft.com/kb/3191895
support.microsoft.com/kb/3191899
support.microsoft.com/kb/3191904
support.microsoft.com/kb/3191909
support.microsoft.com/kb/3191913
support.microsoft.com/kb/3191914
support.microsoft.com/kb/3191915
support.microsoft.com/kb/3212221
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0254
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0255
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0261
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0262
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0264
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0265
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0281
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0254
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0254
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0255
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0255
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0261
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0261
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0262
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0262
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0264
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0264
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0265
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0265
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0281
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0281
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office-Compatibility-Pack-for-Word,-Excel,-and-PowerPoint-2007-File-Formats/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Sharepoint-Server/
threats.kaspersky.com/en/product/Microsoft-Word/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.955 High
EPSS
Percentile
99.4%