8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.089 Low
EPSS
Percentile
94.5%
04/14/2020
Critical
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft PowerPoint 2013 RT Service Pack 1
Microsoft Publisher 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2019 for Mac
Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
Microsoft Publisher 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Access 2016 (32-bit edition)
Office 365 ProPlus for 64-bit Systems
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Word 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Business Productivity Servers 2010 Service Pack 2
Microsoft Office 2013 RT Service Pack 1
Microsoft Outlook 2016 (32-bit edition)
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Access 2010 Service Pack 2 (64-bit editions)
Microsoft Access 2013 Service Pack 1 (32-bit editions)
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Project 2013 Service Pack 1 (32-bit editions)
Microsoft Publisher 2013 Service Pack 1 (32-bit editions)
Office 365 ProPlus for 32-bit Systems
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Excel 2016 (32-bit edition)
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2016 (64-bit edition)
Microsoft PowerPoint 2016 (32-bit edition)
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Visio 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2019 for 32-bit editions
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft Project 2010 Service Pack 2 (64-bit editions)
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
Microsoft Publisher 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2013 RT Service Pack 1
Microsoft Office 2016 for Mac
Microsoft Excel 2013 RT Service Pack 1
Microsoft Office 2016 (32-bit edition)
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Publisher 2016 (64-bit edition)
Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Project 2013 Service Pack 1 (64-bit editions)
Microsoft AutoUpdate for Mac
Microsoft SharePoint Enterprise Server 2016
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft Visio 2016 (32-bit edition)
Microsoft Access 2013 Service Pack 1 (64-bit editions)
Microsoft SharePoint Server 2019
OneDrive for Windows
Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
Microsoft Project 2010 Service Pack 2 (32-bit editions)
Microsoft Excel 2016 (64-bit edition)
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft Project Server 2013 Service Pack 1 (64-bit edition)
Microsoft Access 2016 (64-bit edition)
Microsoft Outlook 2016 (64-bit edition)
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2016 (64-bit edition)
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Publisher 2016 (32-bit edition)
Microsoft Project 2016 (32-bit edition)
Microsoft Access 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2019 for 64-bit editions
Microsoft Visio 2016 (64-bit edition)
Microsoft Visio 2013 Service Pack 1 (32-bit editions)
Microsoft Visio 2010 Service Pack 2 (32-bit editions)
Microsoft Visio 2013 Service Pack 1 (64-bit editions)
Microsoft Project 2016 (64-bit edition)
Microsoft Office Online Server
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2020-0984
CVE-2020-0980
CVE-2020-0961
CVE-2020-0924
CVE-2020-0925
CVE-2020-0926
CVE-2020-0927
CVE-2020-0920
CVE-2020-0923
CVE-2020-0906
CVE-2020-0929
CVE-2020-0760
CVE-2020-0991
CVE-2020-0979
CVE-2020-0978
CVE-2020-0977
CVE-2020-0976
CVE-2020-0975
CVE-2020-0974
CVE-2020-0973
CVE-2020-0972
CVE-2020-0971
CVE-2020-0954
CVE-2020-0933
CVE-2020-0932
CVE-2020-0931
CVE-2020-0930
CVE-2020-0935
ACE
CVE-2020-09844.6Warning
CVE-2020-09809.3Critical
CVE-2020-09619.3Critical
CVE-2020-09243.5Warning
CVE-2020-09253.5Warning
CVE-2020-09263.5Warning
CVE-2020-09273.5Warning
CVE-2020-09206.5High
CVE-2020-09233.5Warning
CVE-2020-09069.3Critical
CVE-2020-09296.5High
CVE-2020-07606.8High
CVE-2020-09919.3Critical
CVE-2020-09799.3Critical
CVE-2020-09783.5Warning
CVE-2020-09773.5Warning
CVE-2020-09763.5Warning
CVE-2020-09753.5Warning
CVE-2020-09746.5High
CVE-2020-09733.5Warning
CVE-2020-09723.5Warning
CVE-2020-09716.5High
CVE-2020-09543.5Warning
CVE-2020-09333.5Warning
CVE-2020-09326.5High
CVE-2020-09316.5High
CVE-2020-09303.5Warning
CVE-2020-09352.1Warning
3203462
4484258
4475609
3162033
4011584
4484293
4484285
4484214
4484281
4484260
2553306
4484244
4484300
4484269
4484319
4484283
4484126
4032216
4484292
4484273
4484307
4484274
3128012
4484226
4464544
4462153
4484322
4484295
4484125
4484238
4484291
4484296
4484301
4484308
4484294
4484298
4484246
4484287
4484229
4011104
4462210
4484297
4484117
4484235
4484167
4484266
4462225
4484132
4011097
4484299
4464527
4484290
4011581
4484284
4484321
support.microsoft.com/kb/2553306
support.microsoft.com/kb/3128012
support.microsoft.com/kb/3162033
support.microsoft.com/kb/3203462
support.microsoft.com/kb/4011097
support.microsoft.com/kb/4011104
support.microsoft.com/kb/4011581
support.microsoft.com/kb/4011584
support.microsoft.com/kb/4032216
support.microsoft.com/kb/4462153
support.microsoft.com/kb/4462210
support.microsoft.com/kb/4462225
support.microsoft.com/kb/4464527
support.microsoft.com/kb/4464544
support.microsoft.com/kb/4475609
support.microsoft.com/kb/4484117
support.microsoft.com/kb/4484125
support.microsoft.com/kb/4484126
support.microsoft.com/kb/4484132
support.microsoft.com/kb/4484167
support.microsoft.com/kb/4484214
support.microsoft.com/kb/4484226
support.microsoft.com/kb/4484229
support.microsoft.com/kb/4484235
support.microsoft.com/kb/4484238
support.microsoft.com/kb/4484244
support.microsoft.com/kb/4484246
support.microsoft.com/kb/4484258
support.microsoft.com/kb/4484260
support.microsoft.com/kb/4484266
support.microsoft.com/kb/4484269
support.microsoft.com/kb/4484273
support.microsoft.com/kb/4484274
support.microsoft.com/kb/4484281
support.microsoft.com/kb/4484283
support.microsoft.com/kb/4484284
support.microsoft.com/kb/4484285
support.microsoft.com/kb/4484287
support.microsoft.com/kb/4484290
support.microsoft.com/kb/4484291
support.microsoft.com/kb/4484292
support.microsoft.com/kb/4484293
support.microsoft.com/kb/4484294
support.microsoft.com/kb/4484295
support.microsoft.com/kb/4484296
support.microsoft.com/kb/4484297
support.microsoft.com/kb/4484298
support.microsoft.com/kb/4484299
support.microsoft.com/kb/4484300
support.microsoft.com/kb/4484301
support.microsoft.com/kb/4484307
support.microsoft.com/kb/4484308
support.microsoft.com/kb/4484319
support.microsoft.com/kb/4484321
support.microsoft.com/kb/4484322
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0906
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0920
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0927
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0991
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0760
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0906
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0920
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0923
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0924
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0925
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0926
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0927
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0929
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0930
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0931
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0932
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0933
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0935
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0954
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0961
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0971
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0972
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0973
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0974
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0975
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0976
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0977
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0978
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0979
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0980
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0984
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0991
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Access/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
threats.kaspersky.com/en/product/Microsoft-Visio-2010/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.089 Low
EPSS
Percentile
94.5%