logo
DATABASE RESOURCES PRICING ABOUT US

KLA12220 Multiple vulnerabilities in Microsoft Office

Description

### *Detect date*: 07/13/2021 ### *Severity*: High ### *Description*: Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, obtain sensitive information. ### *Affected products*: Microsoft Word 2016 (64-bit edition) Microsoft Office 2013 RT Service Pack 1 Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Server 2019 Microsoft SharePoint Enterprise Server 2016 Microsoft Word 2016 (32-bit edition) Microsoft Office 2019 for 64-bit editions Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Office 2016 (64-bit edition) Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft Office 2019 for Mac Microsoft Office Online Server Microsoft SharePoint Enterprise Server 2013 Service Pack 1 Microsoft Excel 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2013 RT Service Pack 1 Microsoft Office 2019 for 32-bit editions Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2016 (32-bit edition) Microsoft Excel 2016 (64-bit edition) Microsoft Office 2016 (32-bit edition) Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft Office Web Apps Server 2013 Service Pack 1 ### *Solution*: Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) ### *Original advisories*: [CVE-2021-34452](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34452>) [CVE-2021-34520](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34520>) [CVE-2021-34451](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34451>) [CVE-2021-34467](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34467>) [CVE-2021-34469](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34469>) [CVE-2021-34517](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34517>) [CVE-2021-34468](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34468>) [CVE-2021-34519](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34519>) [CVE-2021-34518](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34518>) [CVE-2021-34501](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34501>) ### *Impacts*: ACE ### *Related products*: [Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>) ### *CVE-IDS*: [CVE-2021-34452](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34452>)6.8High [CVE-2021-34520](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34520>)6.5High [CVE-2021-34451](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34451>)5.0Critical [CVE-2021-34467](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34467>)6.5High [CVE-2021-34469](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34469>)5.8High [CVE-2021-34517](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34517>)5.0Critical [CVE-2021-34468](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34468>)5.4High [CVE-2021-34519](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34519>)2.3Warning [CVE-2021-34518](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34518>)6.8High [CVE-2021-34501](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34501>)6.8High ### *KB list*: [5001949](<http://support.microsoft.com/kb/5001949>) [5001981](<http://support.microsoft.com/kb/5001981>) [5001993](<http://support.microsoft.com/kb/5001993>) [5001973](<http://support.microsoft.com/kb/5001973>) [5001983](<http://support.microsoft.com/kb/5001983>) [5001996](<http://support.microsoft.com/kb/5001996>) [5001977](<http://support.microsoft.com/kb/5001977>) [5001992](<http://support.microsoft.com/kb/5001992>) [5001984](<http://support.microsoft.com/kb/5001984>) [5001979](<http://support.microsoft.com/kb/5001979>) [5001975](<http://support.microsoft.com/kb/5001975>) [5001976](<http://support.microsoft.com/kb/5001976>) [5001986](<http://support.microsoft.com/kb/5001986>) ### *Microsoft official advisories*:


Related