Lucene search

K
mskbMicrosoftKB5001973
HistoryJul 13, 2021 - 7:00 a.m.

Description of the security update for Office Online Server: July 13, 2021 (KB5001973)

2021-07-1307:00:00
Microsoft
support.microsoft.com
31

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.9 Medium

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.1%

Description of the security update for Office Online Server: July 13, 2021 (KB5001973)

Summary

This security update resolves a Microsoft Office Online Server spoofing vulnerability and Microsoft Excel remote code execution vulnerability. To learn more, see Microsoft Common Vulnerabilities and Exposures CVE-2021-34451 and Microsoft Common Vulnerabilities and Exposures CVE-2021-34501.

**Note:**To apply this security update, you must have the release version of Microsoft Office Online Server installed on the computer.

Improvements and fixes

**Note:**Support for Windows Server 2019 has been added for Office Online Server.

Using TLS 1.1 and TLS 1.2 together with Office Online Server requires strong cryptography in .NET Framework 4.5 and later versions. This update enables the strong cryptography in .NET Framework 4.5 or later by adding the following registry keys. After you install this update, you don’t have to manually enable strong cryptography, as you would otherwise have to do by following the steps in the first section of Enable TLS 1.1 and TLS 1.2 support in Office Online Server.

Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319]
“SchUseStrongCrypto”=dword:00000001
“SystemDefaultTlsVersions”=dword:00000001[HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\.NETFramework\\v4.0.30319]
“SchUseStrongCrypto”=dword:00000001
“SystemDefaultTlsVersions”=dword:00000001

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see Security update deployment information: July 13, 2021 (KB5004480).

Security update replacement information

This security update replaces previously released security update 5001943.

File hash information

File name SHA256 hash
wacserver2019-kb5001973-fullfile-x64-glb.exe 04E78403CAB7C5FA7FF1C90C9BCF4891C2E37176C1CB7B5352665149B8FEC871

File information

Download the list of files that are included in security update 5001973.

Information about protection and security

Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.9 Medium

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.1%