8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.038 Low
EPSS
Percentile
91.7%
03/10/2020
Critical
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2016 for Mac
Office 365 ProPlus for 32-bit Systems
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Business Productivity Servers 2010 Service Pack 2
Microsoft SharePoint Server 2019
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft SharePoint Enterprise Server 2016
Microsoft Office Online Server
Office 365 ProPlus for 64-bit Systems
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2016 (32-bit edition)
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Word 2016 (64-bit edition)
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Office 2019 for 64-bit editions
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft Office 2019 for Mac
Microsoft Word 2013 RT Service Pack 1
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2020-0855
CVE-2020-0795
CVE-2020-0850
CVE-2020-0851
CVE-2020-0852
CVE-2020-0891
CVE-2020-0892
CVE-2020-0893
CVE-2020-0894
ACE
CVE-2020-08559.3Critical
CVE-2020-07953.5Warning
CVE-2020-08506.8High
CVE-2020-08519.3Critical
CVE-2020-08529.3Critical
CVE-2020-08913.5Warning
CVE-2020-08929.3Critical
CVE-2020-08933.5Warning
CVE-2020-08943.5Warning
4484237
4484272
4484277
4484197
4484242
4484275
4484231
4484282
4484124
4475606
4484271
4484270
4475602
4475597
4484150
4484240
4484268
support.microsoft.com/kb/4475597
support.microsoft.com/kb/4475602
support.microsoft.com/kb/4475606
support.microsoft.com/kb/4484124
support.microsoft.com/kb/4484150
support.microsoft.com/kb/4484197
support.microsoft.com/kb/4484231
support.microsoft.com/kb/4484237
support.microsoft.com/kb/4484240
support.microsoft.com/kb/4484242
support.microsoft.com/kb/4484268
support.microsoft.com/kb/4484270
support.microsoft.com/kb/4484271
support.microsoft.com/kb/4484272
support.microsoft.com/kb/4484275
support.microsoft.com/kb/4484277
support.microsoft.com/kb/4484282
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0892
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0894
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0795
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0850
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0851
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0852
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0855
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0891
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0892
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0893
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0894
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Word/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.038 Low
EPSS
Percentile
91.7%