Lucene search

K
attackerkbAttackerKBAKB:CC5240D0-9F60-46FF-A6B8-8971D46A2F41
HistoryFeb 14, 2023 - 12:00 a.m.

CVE-2023-21716

2023-02-1400:00:00
attackerkb.com
113

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.454 Medium

EPSS

Percentile

97.4%

Microsoft Word Remote Code Execution Vulnerability

Recent assessments:

cbeek-r7 at March 06, 2023 8:12am UTC reported:

A vulnerability in Microsoft’s Word wwlib allows attackers to get LCE with the privileges of the victim opens a malicious
RTF document. An attacker would be able to deliver this payload in several ways including as an attachment in spear-phishing attacks.

Affected Versions

This vulnerability affects at least the following versions of Microsoft Office:

  • Microsoft Office 365 (Insider Preview – 2211 Build 15831.20122 CTR)

  • Microsoft Office 2016 (Including Insider Slow – 1704 Build 8067.2032 CTR)

  • Microsoft Office 2013

  • Microsoft Office 2010

  • Microsoft Office 2007

Acknowledgement

This issue was discovered, analyzed, and reported by Joshua J. Drake (@jduck).

PoC code from @jduck:

image

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 5

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.454 Medium

EPSS

Percentile

97.4%