None
## Summary
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about the vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2020-16930](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16930>).
**Note** To apply this security update, you must have the release version of [Service Pack 1 for Microsoft Office 2013](<http://support.microsoft.com/kb/2817430>) installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/en-us/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).
## How to get and install the update
### Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).
### Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484435>) website.
### Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
* [Download security update 4484435 for the 32-bit version of Office 2013](<http://www.microsoft.com/download/details.aspx?familyid=d89989e0-2261-4f00-b3ff-d42ad581bbb1>)
* [Download security update 4484435 for the 64-bit version of Office 2013](<http://www.microsoft.com/download/details.aspx?familyid=d6e85c59-40ca-4470-89b4-fa9d679932ae>)
## More information
### Security update deployment information
For deployment information about this update, see [security update deployment information: October 13, 2020](<https://support.microsoft.com/en-us/help/20201013>).
### Security update replacement information
This security update replaces previously released security update [4011104](<http://support.microsoft.com/kb/4011104>).
### File hash information
File name| SHA1 hash| SHA256 hash
---|---|---
vbe72013-kb4484435-fullfile-x86-glb.exe| 6F351D15E7FFFF41485439F01510D5AF96CC1E30| AE7A9D140830CABA90A52AEB2C6BC963FA6C70F4D16247A447F80C65829F838F
vbe72013-kb4484435-fullfile-x64-glb.exe| 8598FF168036DB4B8BFB2EC2167048637AF2484C| E12803DB14E7CE7CE68502E257FF1DA12A739B5F83A3D6B316C3054CF17F34F9
File informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
##
__
For all supported x86-based versions of Office 2013
File identifier| File name| File version| File size| Date| Time
---|---|---|---|---|---
vbeui.dll| vbeui.dll| 7.1.15.5269| 2214808| 15-Sep-20| 11:35
vbe7.dll| vbe7.dll| 7.01.1100| 2683768| 15-Sep-20| 09:58
##
__
For all supported x64-based versions of Office 2013
File identifier| File name| File version| File size| Date| Time
---|---|---|---|---|---
vbeui.dll| vbeui.dll| 7.1.15.5285| 2733968| 15-Sep-20| 11:35
vbe7.dll| vbe7.dll| 7.01.1100| 4412280| 15-Sep-20| 09:58
Information about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)
{"id": "KB4484435", "vendorId": null, "type": "mskb", "bulletinFamily": "microsoft", "title": "Description of the security update for Office 2013: October 13, 2020", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about the vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2020-16930](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16930>). \n \n**Note** To apply this security update, you must have the release version of [Service Pack 1 for Microsoft Office 2013](<http://support.microsoft.com/kb/2817430>) installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/en-us/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484435>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484435 for the 32-bit version of Office 2013](<http://www.microsoft.com/download/details.aspx?familyid=d89989e0-2261-4f00-b3ff-d42ad581bbb1>)\n * [Download security update 4484435 for the 64-bit version of Office 2013](<http://www.microsoft.com/download/details.aspx?familyid=d6e85c59-40ca-4470-89b4-fa9d679932ae>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: October 13, 2020](<https://support.microsoft.com/en-us/help/20201013>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4011104](<http://support.microsoft.com/kb/4011104>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nvbe72013-kb4484435-fullfile-x86-glb.exe| 6F351D15E7FFFF41485439F01510D5AF96CC1E30| AE7A9D140830CABA90A52AEB2C6BC963FA6C70F4D16247A447F80C65829F838F \nvbe72013-kb4484435-fullfile-x64-glb.exe| 8598FF168036DB4B8BFB2EC2167048637AF2484C| E12803DB14E7CE7CE68502E257FF1DA12A739B5F83A3D6B316C3054CF17F34F9 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Office 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nvbeui.dll| vbeui.dll| 7.1.15.5269| 2214808| 15-Sep-20| 11:35 \nvbe7.dll| vbe7.dll| 7.01.1100| 2683768| 15-Sep-20| 09:58 \n \n## \n\n__\n\nFor all supported x64-based versions of Office 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nvbeui.dll| vbeui.dll| 7.1.15.5285| 2733968| 15-Sep-20| 11:35 \nvbe7.dll| vbe7.dll| 7.01.1100| 4412280| 15-Sep-20| 09:58 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "published": "2020-10-13T07:00:00", "modified": "2020-10-13T07:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://support.microsoft.com/en-us/help/4484435", "reporter": "Microsoft", "references": [], "cvelist": ["CVE-2020-16930"], "immutableFields": [], "lastseen": "2022-08-24T11:21:16", "viewCount": 34, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16931", "CVE-2020-16932"]}, {"type": "kaspersky", "idList": ["KLA11976"]}, {"type": "mscve", "idList": ["MS:CVE-2020-16930"]}, {"type": "mskb", "idList": ["KB4484417"]}, {"type": "nessus", "idList": ["SMB_NT_MS20_OCT_OFFICE.NASL", "SMB_NT_MS20_OCT_OFFICE_C2R.NASL"]}, {"type": "zdi", "idList": ["ZDI-20-1252", "ZDI-20-1256"]}]}, "score": {"value": -0.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2020-16930"]}, {"type": "kaspersky", "idList": ["KLA11976"]}, {"type": "mscve", "idList": ["MS:CVE-2020-16930"]}, {"type": "mskb", "idList": ["KB4484417"]}, {"type": "nessus", "idList": ["MICROSOFT_OFFICE_UNSUPPORTED.NASL", "SMB_NT_MS20_OCT_OFFICE.NASL"]}, {"type": "zdi", "idList": ["ZDI-20-1252", "ZDI-20-1256"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2020-16930", "epss": "0.031510000", "percentile": "0.895830000", "modified": "2023-03-16"}], "vulnersScore": -0.1}, "_state": {"dependencies": 1661340148, "score": 1661340240, "epss": 1679062491}, "_internal": {"score_hash": "418dd2e1b261b3f3e03cd90eeb2725b9"}, "kb": "KB4484435", "msrc": "", "mscve": "CVE-2020-16930", "msplatform": "", "msfamily": "Microsoft Office", "msimpact": "Remote Code Execution", "msseverity": "Important", "superseeds": ["KB4011104", "KB3115153", "KB3039734"], "parentseeds": ["KB4486726", "KB5002121"], "msproducts": ["10601", "10603", "10602"], "affectedProducts": ["Microsoft Office 2013 Service Pack 1 (64-bit editions)", "Microsoft Office 2013 RT Service Pack 1", "Microsoft Office 2013 Service Pack 1 (32-bit editions)"], "supportAreaPaths": [], "supportAreaPathNodes": [], "primarySupportAreaPath": []}
{"mskb": [{"lastseen": "2022-08-24T11:21:14", "description": "None\n## Summary\n\nThis security update resolves a remote code execution vulnerability that exists in Microsoft Excel if the software does not correctly handle objects in memory. To learn more about the vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2020-16930](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16930>). \n \n**Note** To apply this security update, you must have the release version of Office 2016 installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/en-us/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484417>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484417 for the 32-bit version of Office 2016](<http://www.microsoft.com/download/details.aspx?familyid=3b4d790e-4b69-4dae-a699-702760fb95d3>)\n * [Download security update 4484417 for the 64-bit version of Office 2016](<http://www.microsoft.com/download/details.aspx?familyid=1e198dc8-b281-47d7-bd03-e763bcca27ab>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: October 13, 2020](<https://support.microsoft.com/en-us/help/20201013>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [3128012](<http://support.microsoft.com/kb/3128012>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nvbe72016-kb4484417-fullfile-x64-glb.exe| 9F44199F4C6A2CAEF016CF0E76BAE2C56516BCBD| 9A2B297E85E8D8933B9017C379BF1445CE791B1C073BA01BA414C8E0BDD5F0D0 \nvbe72016-kb4484417-fullfile-x86-glb.exe| 2902FB93AA8E213FD97728BF57D8564711AF99A5| 2C6881BCC281EE91E904CB80DB0D3F77CF43A5A51F3AD245C6ADBA8108E4FFF3 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x86-based versions of Office 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nvbe7.dll| vbe7.dll| 7.01.1100| 2683768| 15-Sep-20| 08:41 \n \n## \n\n__\n\nFor all supported x64-based versions of Office 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nvbe7.dll| vbe7.dll| 7.01.1100| 4412280| 15-Sep-20| 08:24 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-13T07:00:00", "type": "mskb", "title": "Description of the security update for Office 2016: October 13, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16930"], "modified": "2020-10-13T07:00:00", "id": "KB4484417", "href": "https://support.microsoft.com/en-us/help/4484417", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "mscve": [{"lastseen": "2023-03-17T02:35:17", "description": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\n\nExploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.\n\nThe security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-13T07:00:00", "type": "mscve", "title": "Microsoft Excel Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16930"], "modified": "2020-10-13T07:00:00", "id": "MS:CVE-2020-16930", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-16930", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "zdi": [{"lastseen": "2022-01-31T21:58:07", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XLS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-10-19T00:00:00", "type": "zdi", "title": "Microsoft Excel XLS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16930"], "modified": "2020-10-19T00:00:00", "id": "ZDI-20-1256", "href": "https://www.zerodayinitiative.com/advisories/ZDI-20-1256/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-01-31T21:58:10", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XLS files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-10-19T00:00:00", "type": "zdi", "title": "Microsoft Excel XLS File Parsing Uninitialized Pointer Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16930"], "modified": "2020-10-19T00:00:00", "id": "ZDI-20-1252", "href": "https://www.zerodayinitiative.com/advisories/ZDI-20-1252/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-02-10T14:50:19", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16929, CVE-2020-16930)\n\n - A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16954)\n\n - A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.(CVE-2020-16957)", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-13T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products (October 2020)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16954", "CVE-2020-16957"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS20_OCT_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/141418", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141418);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-16929\",\n \"CVE-2020-16930\",\n \"CVE-2020-16954\",\n \"CVE-2020-16957\"\n );\n script_xref(name:\"MSKB\", value:\"4484417\");\n script_xref(name:\"MSKB\", value:\"4484435\");\n script_xref(name:\"MSKB\", value:\"4486682\");\n script_xref(name:\"MSKB\", value:\"4486688\");\n script_xref(name:\"MSKB\", value:\"4486700\");\n script_xref(name:\"MSFT\", value:\"MS20-4484417\");\n script_xref(name:\"MSFT\", value:\"MS20-4484435\");\n script_xref(name:\"MSFT\", value:\"MS20-4486682\");\n script_xref(name:\"MSFT\", value:\"MS20-4486688\");\n script_xref(name:\"MSFT\", value:\"MS20-4486700\");\n script_xref(name:\"IAVA\", value:\"2020-A-0454-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0462-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0126\");\n\n script_name(english:\"Security Updates for Microsoft Office Products (October 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to\n properly handle objects in memory. An attacker who successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If the current user is logged on with administrative\n user rights, an attacker could take control of the affected system. An attacker could then install\n programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16929,\n CVE-2020-16930)\n\n - A remote code execution vulnerability exists in Microsoft Office software when the software fails to\n properly handle objects in memory. An attacker who successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If the current user is logged on with administrative\n user rights, an attacker could take control of the affected system. An attacker could then install\n programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16954)\n\n - A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly\n handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary \n code on a victim system.(CVE-2020-16957)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4484417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4484435\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4486682\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4486688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4486700\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4484417\n -KB4484435\n -KB4486682\n -KB4486688\n -KB4486700\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and\nmanually perform an update.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-16957\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-10';\nkbs = make_list(\n '4484417',\n '4484435',\n '4486682',\n '4486688',\n '4486700'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvuln = FALSE;\nport = kb_smb_transport();\n\noffice_vers = hotfix_check_office_version();\n\n# Office 2010 SP2\nif (office_vers['14.0'])\n{\n office_sp = get_kb_item('SMB/Office/2010/SP');\n if (!isnull(office_sp) && office_sp == 2)\n {\n prod = 'Microsoft Office 2010 SP2';\n\n path = hotfix_get_officeprogramfilesdir(officever:'14.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office14');\n\n kb = '4486700';\n file = 'graph.exe';\n version = '14.0.7261.5000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\n# Office 2013 SP1\nif (office_vers['15.0'])\n{\n office_sp = get_kb_item('SMB/Office/2013/SP');\n if (!isnull(office_sp) && office_sp == 1)\n {\n prod = 'Microsoft Office 2013 SP1';\n\n path = hotfix_get_officecommonfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\VBA\\\\VBA7.1');\n kb = '4484435';\n file = 'vbe7.dll';\n version = '7.1.11.0';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office15');\n\n kb = '4486688';\n file = 'graph.exe';\n version = '15.0.5285.1000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n }\n}\n\n# Office 2016\nif (office_vers['16.0'])\n{\n office_sp = get_kb_item('SMB/Office/2016/SP');\n if (!isnull(office_sp) && office_sp == 0)\n {\n prod = 'Microsoft Office 2016';\n\n path = hotfix_get_officecommonfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\VBA\\\\VBA7.1');\n kb = '4484417';\n file = 'vbe7.dll';\n version = '7.1.11.0';\n # MSI vbe7.dll\n if (hotfix_check_fversion(file:file, version:version, channel:'MSI', channel_product:'Office', path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n \n path = hotfix_get_officeprogramfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office16');\n\n # MSI graph.exe\n if (hotfix_check_fversion(file:'graph.exe', version:'16.0.5071.1000', channel:'MSI', channel_product:'Office', path:path, kb:'4486682', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-10T19:22:34", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16929, CVE-2020-16930)\n\n - A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16954)\n\n - A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.(CVE-2020-16957)", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products C2R (October 2020)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16954", "CVE-2020-16957"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS20_OCT_OFFICE_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162022", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162022);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\n \"CVE-2020-16929\",\n \"CVE-2020-16930\",\n \"CVE-2020-16954\",\n \"CVE-2020-16957\"\n );\n script_xref(name:\"IAVA\", value:\"2020-A-0454-S\");\n script_xref(name:\"IAVA\", value:\"2020-A-0462-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2020-0126\");\n\n script_name(english:\"Security Updates for Microsoft Office Products C2R (October 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to\n properly handle objects in memory. An attacker who successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If the current user is logged on with administrative\n user rights, an attacker could take control of the affected system. An attacker could then install\n programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16929,\n CVE-2020-16930)\n\n - A remote code execution vulnerability exists in Microsoft Office software when the software fails to\n properly handle objects in memory. An attacker who successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If the current user is logged on with administrative\n user rights, an attacker could take control of the affected system. An attacker could then install\n programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-16954)\n\n - A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly\n handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary \n code on a victim system.(CVE-2020-16957)\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-microsoft365-apps-by-date\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-16957\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS20-10';\n\nvar app_info = vcf::microsoft::office::get_app_info(app:'Microsoft Office');\n\nvar constraints = [\n \n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21236','channel': 'Microsoft 365 Apps on Windows 7'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21236','channel': 'Deferred','channel_version': '2002'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.11929.20966','channel': 'Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13127.20638','channel': 'Enterprise Deferred','channel_version': '2008'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13029.20708','channel': 'Enterprise Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13127.20638','channel': 'First Release for Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13231.20390','channel': '2016 Retail'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13231.20390','channel': 'Current'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.13231.20390','channel': '2019 Retail'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.10367.20048','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE,\n bulletin:bulletin,\n subproduct:'Office'\n);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2023-02-09T15:08:42", "description": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16930, CVE-2020-16931, CVE-2020-16932.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-16T23:15:00", "type": "cve", "title": "CVE-2020-16929", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16931", "CVE-2020-16932"], "modified": "2020-10-20T13:28:00", "cpe": ["cpe:/a:microsoft:sharepoint_server:2010", "cpe:/a:microsoft:office:2016", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel_web_app:2010", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:office:2013", "cpe:/a:microsoft:office_web_apps:2010", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:office_online_server:1.0", "cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2010", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:sharepoint_enterprise_server:2013"], "id": "CVE-2020-16929", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16929", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_web_app:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*"]}, {"lastseen": "2023-02-09T15:08:43", "description": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16929, CVE-2020-16931, CVE-2020-16932.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-16T23:15:00", "type": "cve", "title": "CVE-2020-16930", "cwe": ["CWE-824", "CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16931", "CVE-2020-16932"], "modified": "2020-10-20T13:24:00", "cpe": ["cpe:/a:microsoft:office:2013", "cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:office:2019", "cpe:/a:microsoft:office:2016"], "id": "CVE-2020-16930", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16930", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*"]}, {"lastseen": "2023-02-09T15:08:43", "description": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16929, CVE-2020-16930, CVE-2020-16931.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-16T23:15:00", "type": "cve", "title": "CVE-2020-16932", "cwe": ["CWE-908", "CWE-909"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16931", "CVE-2020-16932"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:office_online_server:1.0", "cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2019"], "id": "CVE-2020-16932", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16932", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*"]}, {"lastseen": "2023-02-09T15:08:43", "description": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16929, CVE-2020-16930, CVE-2020-16932.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-16T23:15:00", "type": "cve", "title": "CVE-2020-16931", "cwe": ["CWE-908"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16931", "CVE-2020-16932"], "modified": "2020-10-20T13:24:00", "cpe": ["cpe:/a:microsoft:365_apps:-", "cpe:/a:microsoft:excel:2013", "cpe:/a:microsoft:excel:2010", "cpe:/a:microsoft:excel:2016", "cpe:/a:microsoft:office_online_server:1.0", "cpe:/a:microsoft:office_web_apps:2013", "cpe:/a:microsoft:office:2019"], "id": "CVE-2020-16931", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16931", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*"]}], "kaspersky": [{"lastseen": "2023-03-21T08:26:55", "description": "### *Detect date*:\n10/13/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:\n\n### *Affected products*:\nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nMicrosoft Office 2010 Service Pack 2 (64-bit editions) \nMicrosoft SharePoint Server 2019 \nMicrosoft Office 2016 (32-bit edition) \nMicrosoft Office 2013 RT Service Pack 1 \n3D Viewer \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Word 2013 Service Pack 1 (32-bit editions) \nMicrosoft SharePoint Foundation 2010 Service Pack 2 \nMicrosoft Word 2013 Service Pack 1 (64-bit editions) \nMicrosoft Office 2013 Click-to-Run (C2R) for 32-bit editions \nMicrosoft Office Web Apps 2010 Service Pack 2 \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nMicrosoft Excel 2010 Service Pack 2 (64-bit editions) \nMicrosoft Outlook 2010 Service Pack 2 (64-bit editions) \nMicrosoft Word 2010 Service Pack 2 (32-bit editions) \nMicrosoft Outlook 2013 RT Service Pack 1 \nMicrosoft Word 2013 RT Service Pack 1 \nMicrosoft Outlook 2013 Service Pack 1 (64-bit editions) \nMicrosoft Office Online Server \nMicrosoft Word 2016 (32-bit edition) \nMicrosoft Excel 2010 Service Pack 2 (32-bit editions) \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nMicrosoft Outlook 2016 (32-bit edition) \nMicrosoft Word 2010 Service Pack 2 (64-bit editions) \nMicrosoft Outlook 2013 Service Pack 1 (32-bit editions) \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft Excel Web App 2010 Service Pack 2 \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft Word 2016 (64-bit edition) \nMicrosoft SharePoint Server 2010 Service Pack 2 \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft Excel 2016 (64-bit edition) \nMicrosoft Outlook 2016 (64-bit edition) \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Office Web Apps 2013 Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2013 Service Pack 1 \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft Office 2019 for Mac \nMicrosoft Office 2016 for Mac \nMicrosoft Outlook 2010 Service Pack 2 (32-bit editions) \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2010 Service Pack 2 (32-bit editions) \nMicrosoft Office 2013 Click-to-Run (C2R) for 64-bit editions\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-16928](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16928>) \n[CVE-2020-16929](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16929>) \n[CVE-2020-16941](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16941>) \n[CVE-2020-16946](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16946>) \n[CVE-2020-16947](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16947>) \n[CVE-2020-16944](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16944>) \n[CVE-2020-16945](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16945>) \n[CVE-2020-16948](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16948>) \n[CVE-2020-16949](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16949>) \n[CVE-2020-16942](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16942>) \n[CVE-2020-16932](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16932>) \n[CVE-2020-16952](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16952>) \n[CVE-2020-16955](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16955>) \n[CVE-2020-16954](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16954>) \n[CVE-2020-16951](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16951>) \n[CVE-2020-16950](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16950>) \n[CVE-2020-16953](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16953>) \n[CVE-2020-16934](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16934>) \n[CVE-2020-16933](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16933>) \n[CVE-2020-16918](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16918>) \n[CVE-2020-16957](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16957>) \n[CVE-2020-16930](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16930>) \n[CVE-2020-16931](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-16931>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>)\n\n### *CVE-IDS*:\n[CVE-2020-16918](<https://vulners.com/cve/CVE-2020-16918>)9.3Critical \n[CVE-2020-16928](<https://vulners.com/cve/CVE-2020-16928>)6.8High \n[CVE-2020-16929](<https://vulners.com/cve/CVE-2020-16929>)6.8High \n[CVE-2020-16941](<https://vulners.com/cve/CVE-2020-16941>)2.1Warning \n[CVE-2020-16946](<https://vulners.com/cve/CVE-2020-16946>)3.5Warning \n[CVE-2020-16947](<https://vulners.com/cve/CVE-2020-16947>)9.3Critical \n[CVE-2020-16944](<https://vulners.com/cve/CVE-2020-16944>)3.5Warning \n[CVE-2020-16945](<https://vulners.com/cve/CVE-2020-16945>)3.5Warning \n[CVE-2020-16948](<https://vulners.com/cve/CVE-2020-16948>)4.0Warning \n[CVE-2020-16949](<https://vulners.com/cve/CVE-2020-16949>)5.0Critical \n[CVE-2020-16942](<https://vulners.com/cve/CVE-2020-16942>)2.1Warning \n[CVE-2020-16932](<https://vulners.com/cve/CVE-2020-16932>)6.8High \n[CVE-2020-16952](<https://vulners.com/cve/CVE-2020-16952>)6.8High \n[CVE-2020-16955](<https://vulners.com/cve/CVE-2020-16955>)6.8High \n[CVE-2020-16954](<https://vulners.com/cve/CVE-2020-16954>)6.8High \n[CVE-2020-16951](<https://vulners.com/cve/CVE-2020-16951>)6.8High \n[CVE-2020-16950](<https://vulners.com/cve/CVE-2020-16950>)4.3Warning \n[CVE-2020-16953](<https://vulners.com/cve/CVE-2020-16953>)4.0Warning \n[CVE-2020-16934](<https://vulners.com/cve/CVE-2020-16934>)6.8High \n[CVE-2020-16933](<https://vulners.com/cve/CVE-2020-16933>)6.8High \n[CVE-2020-16957](<https://vulners.com/cve/CVE-2020-16957>)9.3Critical \n[CVE-2020-16930](<https://vulners.com/cve/CVE-2020-16930>)6.8High \n[CVE-2020-16931](<https://vulners.com/cve/CVE-2020-16931>)6.8High\n\n### *KB list*:\n[4486682](<http://support.microsoft.com/kb/4486682>) \n[4486678](<http://support.microsoft.com/kb/4486678>) \n[4484417](<http://support.microsoft.com/kb/4484417>) \n[4486676](<http://support.microsoft.com/kb/4486676>) \n[4486694](<http://support.microsoft.com/kb/4486694>) \n[4486707](<http://support.microsoft.com/kb/4486707>) \n[4486701](<http://support.microsoft.com/kb/4486701>) \n[4486687](<http://support.microsoft.com/kb/4486687>) \n[4486708](<http://support.microsoft.com/kb/4486708>) \n[4486677](<http://support.microsoft.com/kb/4486677>) \n[4486674](<http://support.microsoft.com/kb/4486674>) \n[4486688](<http://support.microsoft.com/kb/4486688>) \n[4484524](<http://support.microsoft.com/kb/4484524>) \n[4486663](<http://support.microsoft.com/kb/4486663>) \n[4486689](<http://support.microsoft.com/kb/4486689>) \n[4484531](<http://support.microsoft.com/kb/4484531>) \n[4486700](<http://support.microsoft.com/kb/4486700>) \n[4486679](<http://support.microsoft.com/kb/4486679>) \n[4486695](<http://support.microsoft.com/kb/4486695>) \n[4486703](<http://support.microsoft.com/kb/4486703>) \n[4484435](<http://support.microsoft.com/kb/4484435>) \n[4486692](<http://support.microsoft.com/kb/4486692>) \n[4462175](<http://support.microsoft.com/kb/4462175>) \n[4486671](<http://support.microsoft.com/kb/4486671>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-13T00:00:00", "type": "kaspersky", "title": "KLA11976 Multiple vulnerabilites in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-16918", "CVE-2020-16928", "CVE-2020-16929", "CVE-2020-16930", "CVE-2020-16931", "CVE-2020-16932", "CVE-2020-16933", "CVE-2020-16934", "CVE-2020-16941", "CVE-2020-16942", "CVE-2020-16944", "CVE-2020-16945", "CVE-2020-16946", "CVE-2020-16947", "CVE-2020-16948", "CVE-2020-16949", "CVE-2020-16950", "CVE-2020-16951", "CVE-2020-16952", "CVE-2020-16953", "CVE-2020-16954", "CVE-2020-16955", "CVE-2020-16957"], "modified": "2023-03-17T00:00:00", "id": "KLA11976", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11976/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}