9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.1 High
AI Score
Confidence
Low
0.941 High
EPSS
Percentile
99.2%
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
Technical details
To exploit (2) attacker must first leverage another vulnerability to cause code execution in IE with EPM. Than malicious can execute Excel, Notepad, PowerPoint or another with unsafe command line parameter. Another part of updates for this vulnerability listed in KLA10646, KLA10648
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2015-1642 critical
CVE-2015-2423 warning
CVE-2015-2466 critical
CVE-2015-2468 critical
CVE-2015-2467 critical
CVE-2015-2469 critical
CVE-2015-2470 critical
CVE-2015-2477 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/2553313
support.microsoft.com/kb/2596650
support.microsoft.com/kb/2598244
support.microsoft.com/kb/2687409
support.microsoft.com/kb/2837610
support.microsoft.com/kb/2965280
support.microsoft.com/kb/2965310
support.microsoft.com/kb/2986254
support.microsoft.com/kb/3039734
support.microsoft.com/kb/3039798
support.microsoft.com/kb/3054816
support.microsoft.com/kb/3054858
support.microsoft.com/kb/3054876
support.microsoft.com/kb/3054888
support.microsoft.com/kb/3054929
support.microsoft.com/kb/3054960
support.microsoft.com/kb/3054974
support.microsoft.com/kb/3054991
support.microsoft.com/kb/3054992
support.microsoft.com/kb/3055003
support.microsoft.com/kb/3055029
support.microsoft.com/kb/3055030
support.microsoft.com/kb/3055033
support.microsoft.com/kb/3055037
support.microsoft.com/kb/3055039
support.microsoft.com/kb/3055044
support.microsoft.com/kb/3055051
support.microsoft.com/kb/3055052
support.microsoft.com/kb/3055053
support.microsoft.com/kb/3055054
support.microsoft.com/kb/3080790
support.microsoft.com/kb/3081349
support.microsoft.com/kb/3082420
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-1642
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2423
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2466
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2467
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2468
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2469
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2470
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2477
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office/