8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
Low
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
10/11/2022
Critical
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2016 (32-bit edition)
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Server Subscription Edition
Microsoft Office 2016 (64-bit edition)
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft SharePoint Enterprise Server 2016
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2019 for Mac
Microsoft Office LTSC for Mac 2021
Microsoft SharePoint Server 2019
Microsoft Office 2019 for 32-bit editions
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2022-41036
CVE-2022-38001
CVE-2022-41037
CVE-2022-38048
CVE-2022-41031
CVE-2022-38053
CVE-2022-38049
CVE-2022-41043
CVE-2022-41038
ACE
CVE-2022-410368.8Critical
CVE-2022-380016.5High
CVE-2022-410378.8Critical
CVE-2022-380487.8Critical
CVE-2022-410317.8Critical
CVE-2022-380538.8Critical
CVE-2022-380497.8Critical
CVE-2022-410433.3Warning
CVE-2022-410388.8Critical
5002279
5002287
5002278
5002283
5002026
5002290
5002288
5002284
support.microsoft.com/kb/5002026
support.microsoft.com/kb/5002278
support.microsoft.com/kb/5002279
support.microsoft.com/kb/5002283
support.microsoft.com/kb/5002284
support.microsoft.com/kb/5002287
support.microsoft.com/kb/5002288
support.microsoft.com/kb/5002290
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38001
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38048
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38049
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41031
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41036
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41038
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41043
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38001
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38048
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38049
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38053
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41031
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41036
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41037
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41038
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41043
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-SharePoint/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
Low
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P