8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.7 High
AI Score
Confidence
High
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:P/A:N
0.01 Low
EPSS
Percentile
83.0%
04/11/2023
High
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface.
Microsoft Office 2019 for 32-bit editions
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Publisher 2013 Service Pack 1 (64-bit editions)
Microsoft Publisher 2013 Service Pack 1 (32-bit editions)
Microsoft Publisher 2016 (64-bit edition)
Microsoft Publisher 2016 (32-bit edition)
Microsoft Office 2019 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft Publisher 2013 Service Pack 1 RT
Microsoft SharePoint Server 2019
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server Subscription Edition
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office 2019 for Mac
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)
Install Office updates
CVE-2023-28311
CVE-2023-28288
CVE-2023-28285
CVE-2023-28287
CVE-2023-28295
ACE
CVE-2023-283117.8Critical
CVE-2023-282888.1Critical
CVE-2023-282857.8Critical
CVE-2023-282877.8Critical
CVE-2023-282957.8Critical
5002385
5002383
5002221
5002381
5002213
5002373
5002375
support.microsoft.com/kb/5002213
support.microsoft.com/kb/5002221
support.microsoft.com/kb/5002373
support.microsoft.com/kb/5002375
support.microsoft.com/kb/5002381
support.microsoft.com/kb/5002383
support.microsoft.com/kb/5002385
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28295
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28311
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28285
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28288
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
support.microsoft.com/en-us/office/install-office-updates-2ab296f3-7f03-43a2-8e50-46de917611c5
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-SharePoint/
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.7 High
AI Score
Confidence
High
5.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:P/A:N
0.01 Low
EPSS
Percentile
83.0%