8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.674 Medium
EPSS
Percentile
97.9%
12/08/2020
Critical
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, bypass security restrictions, gain privileges.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft SharePoint Server 2019
Microsoft PowerPoint 2016 (32-bit edition)
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2016 (64-bit edition)
Office Online Server
Microsoft Office 2019 for Mac
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2019 for 64-bit editions
Microsoft Excel 2013 RT Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft PowerPoint 2016 (64-bit edition)
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2016 (64-bit edition)
Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2013 RT Service Pack 1
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Excel 2016 (32-bit edition)
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
Microsoft Office Online Server
Microsoft Outlook 2016 (64-bit edition)
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Outlook 2016 (32-bit edition)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2020-17129
CVE-2020-17128
CVE-2020-17115
CVE-2020-17123
CVE-2020-17122
CVE-2020-17121
CVE-2020-17120
CVE-2020-17130
CVE-2020-17126
CVE-2020-17125
CVE-2020-17124
CVE-2020-17127
CVE-2020-17089
CVE-2020-17118
CVE-2020-17119
ACE
CVE-2020-171297.8Critical
CVE-2020-171287.8Critical
CVE-2020-171158.0Critical
CVE-2020-171237.8Critical
CVE-2020-171227.8Critical
CVE-2020-171218.8Critical
CVE-2020-171205.3High
CVE-2020-171306.5High
CVE-2020-171265.5High
CVE-2020-171257.8Critical
CVE-2020-171247.8Critical
CVE-2020-171277.8Critical
CVE-2020-170897.1High
CVE-2020-171188.1Critical
CVE-2020-171196.5High
4493139
4493138
4486732
4484468
4484372
4484393
4486750
4486753
4486752
4486754
4486757
4486698
4493140
4486748
4493148
4493149
4486696
4486697
4486721
4486742
4486704
4486760
4486751
support.microsoft.com/kb/4484372
support.microsoft.com/kb/4484393
support.microsoft.com/kb/4484468
support.microsoft.com/kb/4486696
support.microsoft.com/kb/4486697
support.microsoft.com/kb/4486698
support.microsoft.com/kb/4486704
support.microsoft.com/kb/4486721
support.microsoft.com/kb/4486732
support.microsoft.com/kb/4486742
support.microsoft.com/kb/4486748
support.microsoft.com/kb/4486750
support.microsoft.com/kb/4486751
support.microsoft.com/kb/4486752
support.microsoft.com/kb/4486753
support.microsoft.com/kb/4486754
support.microsoft.com/kb/4486757
support.microsoft.com/kb/4486760
support.microsoft.com/kb/4493138
support.microsoft.com/kb/4493139
support.microsoft.com/kb/4493140
support.microsoft.com/kb/4493148
support.microsoft.com/kb/4493149
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17089
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17115
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17118
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17119
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17120
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17121
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17122
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17123
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17124
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17125
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17126
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17127
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17128
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17129
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17130
nvd.nist.gov/vuln/detail/CVE-2020-17089
nvd.nist.gov/vuln/detail/CVE-2020-17115
nvd.nist.gov/vuln/detail/CVE-2020-17118
nvd.nist.gov/vuln/detail/CVE-2020-17119
nvd.nist.gov/vuln/detail/CVE-2020-17120
nvd.nist.gov/vuln/detail/CVE-2020-17121
nvd.nist.gov/vuln/detail/CVE-2020-17122
nvd.nist.gov/vuln/detail/CVE-2020-17123
nvd.nist.gov/vuln/detail/CVE-2020-17124
nvd.nist.gov/vuln/detail/CVE-2020-17125
nvd.nist.gov/vuln/detail/CVE-2020-17126
nvd.nist.gov/vuln/detail/CVE-2020-17127
nvd.nist.gov/vuln/detail/CVE-2020-17128
nvd.nist.gov/vuln/detail/CVE-2020-17129
nvd.nist.gov/vuln/detail/CVE-2020-17130
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.674 Medium
EPSS
Percentile
97.9%