Lucene search

K
kasperskyKaspersky LabKLA50318
HistoryJun 13, 2023 - 12:00 a.m.

KLA50318 Multiple vulnerabilities in Microsoft Office

2023-06-1300:00:00
Kaspersky Lab
threats.kaspersky.com
42
microsoft office
vulnerabilities
exploits
privileges
code execution
user interface
denial of service
sensitive information
updates
outlook
excel
sharepoint

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.894

Percentile

98.8%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft OneNote can be exploited remotely to spoof user interface.
  4. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  5. A denial of service vulnerability in Microsoft SharePoint can be exploited remotely to cause denial of service.
  6. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  7. A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
  9. Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2023-33142

CVE-2023-33133

CVE-2023-33140

CVE-2023-33132

CVE-2023-33129

CVE-2023-33137

CVE-2023-33130

CVE-2023-33146

CVE-2023-29357

CVE-2023-32029

CVE-2023-33131

CVE-2023-27909

CVE-2023-27911

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office

Microsoft-Outlook

Microsoft-Excel

Microsoft-SharePoint

CVE list

CVE-2023-27909 critical

CVE-2023-27911 critical

CVE-2023-33142 high

CVE-2023-33133 critical

CVE-2023-33140 high

CVE-2023-33132 high

CVE-2023-33129 high

CVE-2023-33137 critical

CVE-2023-33130 high

CVE-2023-33146 critical

CVE-2023-29357 critical

CVE-2023-32029 critical

CVE-2023-33131 critical

KB list

5002402

5002416

5002405

5002403

5002387

5002382

5002404

5002401

5002414

5002565

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)

Install Office updates

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Office Online ServerMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft Outlook 2016 (32-bit edition)Microsoft Excel 2013 Service Pack 1 (64-bit editions)Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Excel 2013 RT Service Pack 1Microsoft Excel 2016 (64-bit edition)Microsoft SharePoint Server 2019Microsoft Excel 2013 Service Pack 1 (32-bit editions)Microsoft Office 2019 for 32-bit editionsMicrosoft SharePoint Enterprise Server 2016Microsoft Outlook 2013 (64-bit editions)Microsoft Outlook 2016 (64-bit edition)Microsoft Excel 2016 (32-bit edition)Microsoft Office 2019 for MacMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft SharePoint Server Subscription EditionMicrosoft Office 2019 for 64-bit editionsMicrosoft OneNote for UniversalMicrosoft Outlook 2013 (32-bit editions)Microsoft Outlook 2013 RT Service Pack 1

References

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.894

Percentile

98.8%