7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.175 Low
EPSS
Percentile
96.0%
05/08/2018
High
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions and gain privileges.
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2016 (32-bit edition)
Microsoft Excel 2016 (64-bit edition)
Microsoft Infopath 2013 Service Pack 1 (32-bit edition)
Microsoft Infopath 2013 Service Pack 1 (64-bit edition)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editions
Microsoft Office 2016 Click-to-Run (C2R) for 64-bit editions
Microsoft Office 2016 for Mac
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Web Apps Server 2010 Service Pack 2
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft Project Server 2010 Service Pack 2
Microsoft Project Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
Word Automation Services
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2018-8147
CVE-2018-8148
CVE-2018-8149
CVE-2018-8150
CVE-2018-8155
CVE-2018-8156
CVE-2018-8157
CVE-2018-8158
CVE-2018-8160
CVE-2018-8161
CVE-2018-8162
CVE-2018-8163
CVE-2018-8168
CVE-2018-8173
ACE
CVE-2018-81479.3Critical
CVE-2018-81489.3Critical
CVE-2018-81493.5Warning
CVE-2018-81504.3Warning
CVE-2018-81553.5Warning
CVE-2018-81563.5Warning
CVE-2018-81579.3Critical
CVE-2018-81589.3Critical
CVE-2018-81604.3Warning
CVE-2018-81619.3Critical
CVE-2018-81629.3Critical
CVE-2018-81634.3Warning
CVE-2018-81683.5Warning
CVE-2018-81739.3Critical
2899590
3114889
3162075
3172436
4018308
4018327
4018381
4018382
4018383
4018388
4018390
4018393
4018396
4018398
4018399
4022130
4022135
4022137
4022139
4022141
4022142
4022145
4022146
4022150
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
support.microsoft.com/kb/2899590
support.microsoft.com/kb/3114889
support.microsoft.com/kb/3162075
support.microsoft.com/kb/3172436
support.microsoft.com/kb/4018308
support.microsoft.com/kb/4018327
support.microsoft.com/kb/4018381
support.microsoft.com/kb/4018382
support.microsoft.com/kb/4018383
support.microsoft.com/kb/4018388
support.microsoft.com/kb/4018390
support.microsoft.com/kb/4018393
support.microsoft.com/kb/4018396
support.microsoft.com/kb/4018398
support.microsoft.com/kb/4018399
support.microsoft.com/kb/4022130
support.microsoft.com/kb/4022135
support.microsoft.com/kb/4022137
support.microsoft.com/kb/4022139
support.microsoft.com/kb/4022141
support.microsoft.com/kb/4022142
support.microsoft.com/kb/4022145
support.microsoft.com/kb/4022146
support.microsoft.com/kb/4022150
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8147
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8148
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8149
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8150
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8156
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8157
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8158
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8161
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8163
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8168
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8173
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8147
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8148
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8149
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8150
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8155
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8156
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8157
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8158
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8160
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8161
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8162
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8163
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8168
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8173
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Sharepoint-Server/
threats.kaspersky.com/en/product/Microsoft-Word/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.175 Low
EPSS
Percentile
96.0%