8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.283 Low
EPSS
Percentile
96.8%
05/11/2021
High
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft Office Online Server
Microsoft SharePoint Enterprise Server 2016
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2013 RT Service Pack 1
Microsoft Word 2016 (64-bit edition)
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2013 RT Service Pack 1
Skype for Business Server 2015 CU11
Microsoft Office 2019 for 32-bit editions
Microsoft Excel 2016 (64-bit edition)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft SharePoint Foundation 2013 Service Pack 1
Skype for Business Server 2019 CU5
Microsoft Office 2019 for Mac
Microsoft Excel 2013 RT Service Pack 1
Microsoft Word 2016 (32-bit edition)
Microsoft Office 2019 for 64-bit editions
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Lync Server 2013 CU10
Microsoft Excel 2016 (32-bit edition)
Microsoft SharePoint Server 2019
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-31181
CVE-2021-26421
CVE-2021-26422
CVE-2021-31178
CVE-2021-28455
CVE-2021-26418
CVE-2021-31179
CVE-2021-31180
CVE-2021-28478
CVE-2021-28474
CVE-2021-31172
CVE-2021-31177
CVE-2021-31173
CVE-2021-31176
CVE-2021-31174
CVE-2021-31175
CVE-2021-31171
ACE
CVE-2021-284558.8Critical
CVE-2021-311818.8Critical
CVE-2021-264216.5High
CVE-2021-264227.2High
CVE-2021-311785.5High
CVE-2021-264184.6Warning
CVE-2021-311797.8Critical
CVE-2021-311807.8Critical
CVE-2021-284787.6Critical
CVE-2021-284748.8Critical
CVE-2021-311727.1High
CVE-2021-311777.8Critical
CVE-2021-311735.3High
CVE-2021-311767.8Critical
CVE-2021-311745.5High
CVE-2021-311757.8Critical
CVE-2021-311714.1Warning
5001914
5001931
5001919
5001917
4493197
5003729
4464542
5001920
5001927
5001923
4493206
5001918
5001916
5001928
5001936
5001925
5001935
4504711
4484527
support.microsoft.com/kb/4464542
support.microsoft.com/kb/4484527
support.microsoft.com/kb/4493197
support.microsoft.com/kb/4493206
support.microsoft.com/kb/4504711
support.microsoft.com/kb/5001914
support.microsoft.com/kb/5001916
support.microsoft.com/kb/5001917
support.microsoft.com/kb/5001918
support.microsoft.com/kb/5001919
support.microsoft.com/kb/5001920
support.microsoft.com/kb/5001923
support.microsoft.com/kb/5001925
support.microsoft.com/kb/5001927
support.microsoft.com/kb/5001928
support.microsoft.com/kb/5001931
support.microsoft.com/kb/5001935
support.microsoft.com/kb/5001936
support.microsoft.com/kb/5003729
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26418
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26421
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26422
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28474
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28478
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31171
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31172
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31173
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31174
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31175
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31176
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31177
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31178
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31179
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31180
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26421
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26422
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28455
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31171
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31172
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31178
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31179
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31181
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Lync-Server/
threats.kaspersky.com/en/product/Microsoft-Lync/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
threats.kaspersky.com/en/product/Windows-RT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.283 Low
EPSS
Percentile
96.8%