8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.364 Low
EPSS
Percentile
97.1%
06/09/2020
Critical
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Project 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2013 RT Service Pack 1
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft SharePoint Enterprise Server 2016
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Project 2016 (32-bit edition)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Project 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2016 for Mac
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft Project 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2019 for Mac
Microsoft Project 2010 Service Pack 2 (32-bit editions)
Microsoft Excel 2013 RT Service Pack 1
Microsoft Word 2016 (32-bit edition)
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Server 2019
Microsoft Project 2016 (64-bit edition)
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Word 2016 (64-bit edition)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Excel 2016 (64-bit edition)
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2016 (64-bit edition)
Microsoft Excel 2016 (32-bit edition)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft SharePoint Server 2010 Service Pack 2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2020-1298
CVE-2020-1289
CVE-2020-1177
CVE-2020-1318
CVE-2020-1295
CVE-2020-1320
CVE-2020-1323
CVE-2020-1148
CVE-2020-1181
CVE-2020-1229
CVE-2020-1183
CVE-2020-1321
CVE-2020-1178
CVE-2020-1297
CVE-2020-1322
CVE-2020-1225
CVE-2020-1226
ACE
CVE-2020-12983.5Warning
CVE-2020-12893.5Warning
CVE-2020-11773.5Warning
CVE-2020-13183.5Warning
CVE-2020-12956.5High
CVE-2020-13203.5Warning
CVE-2020-13235.8High
CVE-2020-11483.5Warning
CVE-2020-11816.5High
CVE-2020-12294.3Warning
CVE-2020-11833.5Warning
CVE-2020-13216.8High
CVE-2020-11786.5High
CVE-2020-12973.5Warning
CVE-2020-13224.3Warning
CVE-2020-12259.3Critical
CVE-2020-12269.3Critical
4484414
4484399
4484402
4484409
4484361
4484380
4484415
4484405
4484410
4484396
4484369
4484378
4484351
4484403
4484373
4484387
4484391
4484342
4484400
support.microsoft.com/kb/4484342
support.microsoft.com/kb/4484351
support.microsoft.com/kb/4484361
support.microsoft.com/kb/4484369
support.microsoft.com/kb/4484373
support.microsoft.com/kb/4484378
support.microsoft.com/kb/4484380
support.microsoft.com/kb/4484387
support.microsoft.com/kb/4484391
support.microsoft.com/kb/4484396
support.microsoft.com/kb/4484399
support.microsoft.com/kb/4484400
support.microsoft.com/kb/4484402
support.microsoft.com/kb/4484403
support.microsoft.com/kb/4484405
support.microsoft.com/kb/4484409
support.microsoft.com/kb/4484410
support.microsoft.com/kb/4484414
support.microsoft.com/kb/4484415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1148
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1178
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1225
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1226
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1295
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1297
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1298
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1318
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1320
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1321
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1322
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1323
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1148
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1177
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1178
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1181
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1183
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1225
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1226
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1229
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1289
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1295
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1297
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1298
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1318
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1320
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1321
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1322
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1323
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Word/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.364 Low
EPSS
Percentile
97.1%