7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.9 Medium
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.016 Low
EPSS
Percentile
87.1%
This security update resolves a Microsoft Office Online Server spoofing vulnerability and Microsoft Excel remote code execution vulnerability. To learn more, see Microsoft Common Vulnerabilities and Exposures CVE-2021-34451 and Microsoft Common Vulnerabilities and Exposures CVE-2021-34501.
**Note:**To apply this security update, you must have the release version of Microsoft Office Online Server installed on the computer.
**Note:**Support for Windows Server 2019 has been added for Office Online Server.
Using TLS 1.1 and TLS 1.2 together with Office Online Server requires strong cryptography in .NET Framework 4.5 and later versions. This update enables the strong cryptography in .NET Framework 4.5 or later by adding the following registry keys. After you install this update, you don’t have to manually enable strong cryptography, as you would otherwise have to do by following the steps in the first section of Enable TLS 1.1 and TLS 1.2 support in Office Online Server.
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319]
“SchUseStrongCrypto”=dword:00000001
“SystemDefaultTlsVersions”=dword:00000001[HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\.NETFramework\\v4.0.30319]
“SchUseStrongCrypto”=dword:00000001
“SystemDefaultTlsVersions”=dword:00000001
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Security update deployment information: July 13, 2021 (KB5004480).
This security update replaces previously released security update 5001943.
File name | SHA256 hash |
---|---|
wacserver2019-kb5001973-fullfile-x64-glb.exe | 04E78403CAB7C5FA7FF1C90C9BCF4891C2E37176C1CB7B5352665149B8FEC871 |
Download the list of files that are included in security update 5001973.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.9 Medium
AI Score
Confidence
High
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.016 Low
EPSS
Percentile
87.1%