Lucene search

K
kasperskyKaspersky LabKLA20229
HistoryFeb 14, 2023 - 12:00 a.m.

KLA20229 Multiple vulnerabilities in Microsoft Office

2023-02-1400:00:00
Kaspersky Lab
threats.kaspersky.com
68

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.825 High

EPSS

Percentile

98.3%

Detect date:

02/14/2023

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, bypass security restrictions.

Exploitation:

Public exploits exist for this vulnerability.

Affected products:

Microsoft Office for iOS
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2016 (32-bit edition)
Microsoft Office Online Server
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office for Universal
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Word 2013 RT Service Pack 1
Microsoft Office 2019 for Mac
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft OneNote for Android
Microsoft Office LTSC for Mac 2021
SharePoint Server Subscription Edition Language Pack
Microsoft Word 2016 (64-bit edition)
Microsoft SharePoint Server 2019
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Office for Android
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft SharePoint Server Subscription Edition
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2023-21714
CVE-2023-21716
CVE-2023-21721
CVE-2023-21715
CVE-2023-21823
CVE-2023-21717

Impacts:

ACE

Related products:

Microsoft Office

CVE-IDS:

CVE-2023-218237.8Critical
CVE-2023-217145.5High
CVE-2023-217169.8Critical
CVE-2023-217216.5High
CVE-2023-217157.3High
CVE-2023-217178.8Critical

KB list:

5002323
5002352
5002325
5002347
5002342
5002313
5002330
5002350
5002309
5002312
5002346
5002353
5002316

Microsoft official advisories:

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.825 High

EPSS

Percentile

98.3%