8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.97 High
EPSS
Percentile
99.7%
01/09/2018
Critical
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface and obtain sensitive information.
Microsoft Excel 2007 Service Pack 3
Microsoft Excel 2010 Service Pack 2
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1
Microsoft Excel 2016
Microsoft Excel 2016 Click-to-Run (C2R)
Microsoft Excel Viewer 2007 Service Pack 3
Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2013 Service Pack 1
Microsoft Office 2016
Microsoft Office 2016 Click-to-Run (C2R)
Microsoft Office 2016 for Mac
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Office Online Server 2016
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft Office Word Viewer
Microsoft Outlook 2007 Service Pack 3
Microsoft Outlook 2010 Service Pack 2
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Outlook 2013 Service Pack 1
Microsoft Outlook 2016
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Word 2007 Service Pack 3
Microsoft Word 2010 Service Pack 2
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2013 Service Pack 1
Microsoft Word 2016
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
ADV180003
CVE-2018-0789
CVE-2018-0790
CVE-2018-0793
CVE-2018-0791
CVE-2018-0792
CVE-2018-0794
CVE-2018-0795
CVE-2018-0796
CVE-2018-0797
CVE-2018-0798
CVE-2018-0799
CVE-2018-0801
CVE-2018-0802
CVE-2018-0804
CVE-2018-0805
CVE-2018-0806
CVE-2018-0807
CVE-2018-0812
CVE-2018-0819
ACE
CVE-2018-07898.8Critical
CVE-2018-07908.8Critical
CVE-2018-07937.8Critical
CVE-2018-07917.8Critical
CVE-2018-07928.8Critical
CVE-2018-07948.8Critical
CVE-2018-07958.8Critical
CVE-2018-07968.8Critical
CVE-2018-07977.8Critical
CVE-2018-07988.8Critical
CVE-2018-07996.1High
CVE-2018-08018.8Critical
CVE-2018-08027.8Critical
CVE-2018-08048.8Critical
CVE-2018-08058.8Critical
CVE-2018-08068.8Critical
CVE-2018-08078.8Critical
CVE-2018-08127.8Critical
CVE-2018-08196.5High
4011602
4011605
4011627
4011660
4011639
4011606
4011636
4011201
4011622
4011611
4011642
3114998
4011653
4011651
3141547
4011213
4011626
4011273
4011637
4011643
4011607
4011658
4011657
4011659
4011632
4011648
4011615
4011641
4011609
4011579
4011580
4011656
4011574
4011610
4011599
This vulnerability can be exploited by the following malware:
support.microsoft.com/kb/3114998
support.microsoft.com/kb/3141547
support.microsoft.com/kb/4011201
support.microsoft.com/kb/4011213
support.microsoft.com/kb/4011273
support.microsoft.com/kb/4011574
support.microsoft.com/kb/4011579
support.microsoft.com/kb/4011580
support.microsoft.com/kb/4011599
support.microsoft.com/kb/4011602
support.microsoft.com/kb/4011605
support.microsoft.com/kb/4011606
support.microsoft.com/kb/4011607
support.microsoft.com/kb/4011609
support.microsoft.com/kb/4011610
support.microsoft.com/kb/4011611
support.microsoft.com/kb/4011615
support.microsoft.com/kb/4011622
support.microsoft.com/kb/4011626
support.microsoft.com/kb/4011627
support.microsoft.com/kb/4011632
support.microsoft.com/kb/4011636
support.microsoft.com/kb/4011637
support.microsoft.com/kb/4011639
support.microsoft.com/kb/4011641
support.microsoft.com/kb/4011642
support.microsoft.com/kb/4011643
support.microsoft.com/kb/4011648
support.microsoft.com/kb/4011651
support.microsoft.com/kb/4011653
support.microsoft.com/kb/4011656
support.microsoft.com/kb/4011657
support.microsoft.com/kb/4011658
support.microsoft.com/kb/4011659
support.microsoft.com/kb/4011660
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0819
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180003
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0789
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0790
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0791
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0792
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0793
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0794
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0795
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0796
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0797
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0798
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0799
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0801
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0802
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0805
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0806
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0807
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0812
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0819
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/threat/Exploit.MSOffice.CVE-2018-0802/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.97 High
EPSS
Percentile
99.7%