Lucene search

K
kasperskyKaspersky LabKLA61981
HistoryNov 14, 2023 - 12:00 a.m.

KLA61981 Multiple vulnerabilities in Microsoft Office

2023-11-1400:00:00
Kaspersky Lab
threats.kaspersky.com
23
microsoft office
vulnerabilities
security restrictions bypass
arbitrary code execution
public exploits
affected products
critical
high severity
cve-ids
updates
kb list

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.4%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
  2. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  3. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  4. A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
  5. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2023-36037

CVE-2023-36041

CVE-2023-36413

CVE-2023-36045

CVE-2023-38177

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office

Microsoft-Excel

Microsoft-SharePoint

CVE list

CVE-2023-36037 critical

CVE-2023-36041 critical

CVE-2023-36413 high

CVE-2023-36045 critical

CVE-2023-38177 high

KB list

5002521

5002517

5002527

5002518

5002526

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)

Install Office updates

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Microsoft Excel 2016 (64-bit edition)Microsoft Office 2016 (64-bit edition)Microsoft SharePoint Server 2019Microsoft Office LTSC 2021 for 32-bit editionsMicrosoft SharePoint Enterprise Server 2016Microsoft Office LTSC 2021 for 64-bit editionsMicrosoft SharePoint Server Subscription EditionMicrosoft Office 2019 for 64-bit editionsMicrosoft Excel 2016 (32-bit edition)Microsoft Office 2019 for 32-bit editionsMicrosoft Office 2016 (32-bit edition)Microsoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office LTSC for Mac 2021Microsoft 365 Apps for Enterprise for 64-bit Systems

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.4%