CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
38.1%
This security update resolves a Microsoft Office security feature bypass vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2022-33632.
Note: To apply this security update, you must have the release version of Office 2016 installed on the computer.
Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn’t apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home. (See What version of Office am I using?)
This issue is fixed in the August 2, 2022, update for Office 2016 (KB5002248).
4484401 Can’t run a VBA macro if file or folder’s name has double-byte characters in Microsoft Office 2016
This issue is fixed in the September 6, 2022, update for Office 2016 (KB5002251).
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Deployments - Security Update Guide.
This security update replaces previously released security update 4504710.
File name | SHA256 hash |
---|---|
vbe72016-kb5002112-fullfile-x64-glb.exe | D4729B85027CA3A82C013B5D0747B65785620F82C27FFC705D760A2316F91FE4 |
vbe72016-kb5002112-fullfile-x86-glb.exe | 264B1A04514EA6719582053AA56924054BB9CC1F39541C233EA45F44A276C28E |
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
__
For all supported x86-based versions of Office 2016
File identifier | File name | File version | File size | Date | Time |
---|---|---|---|---|---|
vbe7.dll | vbe7.dll | 7.01.1123 | 2688928 | 14-Jun-22 | 07:04 |
__
For all supported x64-based versions of Office 2016
File identifier | File name | File version | File size | Date | Time |
---|---|---|---|---|---|
vbe7.dll | vbe7.dll | 7.01.1123 | 4426144 | 14-Jun-22 | 06:54 |
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
The following table summarizes some of the most important changes to this topic.Date | Description |
---|---|
July 15, 2022 | Added a “Known issues in this update” section to describe an issue that users may experience after installing this update. |
July 16, 2022 | Added a link to provide more details about the known issue. |
July 25, 2022 | Added a second item to the “Known issues in this update” section (VBA macro links). |
August 2, 2022 | Added a resolution for the first known issue in the “Known issues in this update” section. |
August 11, 2022 | Added a third item to the “Known issues in this update” section (VBA project)… |
August 20, 2022 | Added a fix for the second known issue in the “Known issues in this update” section. |
September 6, 2022 | Added a fix for the third known issue in the “Known issues in this update” section. |
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
38.1%