Lucene search

K
kasperskyKaspersky LabKLA12023
HistoryDec 08, 2020 - 12:00 a.m.

KLA12023 Multiple vulnerabilities in Microsoft Office

2020-12-0800:00:00
Kaspersky Lab
threats.kaspersky.com
26

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.674 Medium

EPSS

Percentile

97.9%

Detect date:

12/08/2020

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, bypass security restrictions, gain privileges.

Exploitation:

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products:

Microsoft SharePoint Server 2019
Microsoft PowerPoint 2016 (32-bit edition)
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2016 (64-bit edition)
Office Online Server
Microsoft Office 2019 for Mac
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2019 for 64-bit editions
Microsoft Excel 2013 RT Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft PowerPoint 2016 (64-bit edition)
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2016 (64-bit edition)
Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2013 RT Service Pack 1
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Excel 2016 (32-bit edition)
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
Microsoft Office Online Server
Microsoft Outlook 2016 (64-bit edition)
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Outlook 2016 (32-bit edition)

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2020-17129
CVE-2020-17128
CVE-2020-17115
CVE-2020-17123
CVE-2020-17122
CVE-2020-17121
CVE-2020-17120
CVE-2020-17130
CVE-2020-17126
CVE-2020-17125
CVE-2020-17124
CVE-2020-17127
CVE-2020-17089
CVE-2020-17118
CVE-2020-17119

Impacts:

ACE

Related products:

Microsoft Office

CVE-IDS:

CVE-2020-171297.8Critical
CVE-2020-171287.8Critical
CVE-2020-171158.0Critical
CVE-2020-171237.8Critical
CVE-2020-171227.8Critical
CVE-2020-171218.8Critical
CVE-2020-171205.3High
CVE-2020-171306.5High
CVE-2020-171265.5High
CVE-2020-171257.8Critical
CVE-2020-171247.8Critical
CVE-2020-171277.8Critical
CVE-2020-170897.1High
CVE-2020-171188.1Critical
CVE-2020-171196.5High

KB list:

4493139
4493138
4486732
4484468
4484372
4484393
4486750
4486753
4486752
4486754
4486757
4486698
4493140
4486748
4493148
4493149
4486696
4486697
4486721
4486742
4486704
4486760
4486751

Microsoft official advisories:

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.674 Medium

EPSS

Percentile

97.9%