8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.016 Low
EPSS
Percentile
87.0%
08/09/2022
High
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service.
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2013 RT Service Pack 1
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Excel 2016 (64-bit edition)
Microsoft Outlook 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
Microsoft Office Online Server
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office 2013 RT Service Pack 1
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Excel 2016 (32-bit edition)
Microsoft Outlook 2016 (32-bit edition)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-34717
CVE-2022-33648
CVE-2022-33631
CVE-2022-35742
ACE
CVE-2022-347178.8Critical
CVE-2022-336487.8Critical
CVE-2022-336317.3High
CVE-2022-357427.5Critical
5001990
5002051
4462142
5002228
5002232
5002242
4462148
support.microsoft.com/kb/4462142
support.microsoft.com/kb/4462148
support.microsoft.com/kb/5001990
support.microsoft.com/kb/5002051
support.microsoft.com/kb/5002228
support.microsoft.com/kb/5002232
support.microsoft.com/kb/5002242
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33631
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33648
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35742
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33631
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33648
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34717
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35742
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.016 Low
EPSS
Percentile
87.0%