4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
5.2 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.2%
An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users.
To exploit this vulnerability, an attacker would have to attach a file as a link to an email. The email could then be shared with individuals that should not have access to the files, ignoring the default organizational setting.
The security update addresses the vulnerability by correcting how Outlook handles file attachment links.
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | microsoft_office_2019 | 19.0.0 | cpe:2.3:a:microsoft:microsoft_office_2019:19.0.0:*:*:*:*:*:*:* |
microsoft | 365_apps | 16.0.1 | cpe:2.3:a:microsoft:365_apps:16.0.1:*:*:*:*:*:*:* |
microsoft | microsoft_outlook_2016 | 16.0.0.0 | cpe:2.3:a:microsoft:microsoft_outlook_2016:16.0.0.0:*:*:*:*:*:*:* |
microsoft | microsoft_outlook_2013_sp1 | 15.0.0.0 | cpe:2.3:a:microsoft:microsoft_outlook_2013_sp1:15.0.0.0:sp1:*:*:*:*:*:* |
microsoft | microsoft_outlook_2010_sp2 | 13.0.0.0 | cpe:2.3:a:microsoft:microsoft_outlook_2010_sp2:13.0.0.0:sp2:*:*:*:*:*:* |
[
{
"vendor": "Microsoft",
"product": "Microsoft Office 2019",
"cpes": [
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"versions": [
{
"version": "19.0.0",
"lessThan": "https://aka.ms/OfficeSecurityReleases",
"versionType": "custom",
"status": "affected"
}
]
},
{
"vendor": "Microsoft",
"product": "Microsoft 365 Apps for Enterprise",
"cpes": [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"versions": [
{
"version": "16.0.1",
"lessThan": "https://aka.ms/OfficeSecurityReleases",
"versionType": "custom",
"status": "affected"
}
]
},
{
"vendor": "Microsoft",
"product": "Microsoft Outlook 2016",
"cpes": [
"cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x86:*:*",
"cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x64:*:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"versions": [
{
"version": "16.0.0.0",
"lessThan": "publication",
"versionType": "custom",
"status": "affected"
}
]
},
{
"vendor": "Microsoft",
"product": "Microsoft Outlook 2013 Service Pack 1",
"cpes": [
"cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:x86:*:*",
"cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:outlook:2013:*:*:*:rt:*:*:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems",
"ARM64-based Systems"
],
"versions": [
{
"version": "15.0.0.0",
"lessThan": "publication",
"versionType": "custom",
"status": "affected"
}
]
},
{
"vendor": "Microsoft",
"product": "Microsoft Outlook 2010 Service Pack 2",
"cpes": [
"cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*"
],
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"versions": [
{
"version": "13.0.0.0",
"lessThan": "publication",
"versionType": "custom",
"status": "affected"
}
]
}
]
More
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
5.2 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.2%