10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.7 High
AI Score
Confidence
High
0.746 High
EPSS
Percentile
98.2%
An improper RTF handling was found in Microsoft Office. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely via a specially designed file.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2016-3263 warning
CVE-2016-3209 warning
CVE-2016-3262 warning
CVE-2016-7182 critical
CVE-2016-3396 critical
CVE-2016-7193 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/3118301
support.microsoft.com/kb/3118307
support.microsoft.com/kb/3118308
support.microsoft.com/kb/3118311
support.microsoft.com/kb/3118312
support.microsoft.com/kb/3118317
support.microsoft.com/kb/3118327
support.microsoft.com/kb/3118331
support.microsoft.com/kb/3118345
support.microsoft.com/kb/3118348
support.microsoft.com/kb/3118352
support.microsoft.com/kb/3118360
support.microsoft.com/kb/3118377
support.microsoft.com/kb/3118384
support.microsoft.com/kb/3118394
support.microsoft.com/kb/3127897
support.microsoft.com/kb/3127898
support.microsoft.com/kb/3188397
support.microsoft.com/kb/3188399
support.microsoft.com/kb/3188400
support.microsoft.com/kb/3189647
support.microsoft.com/kb/3193438
support.microsoft.com/kb/3193442
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3209
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3262
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3263
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3396
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7182
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7193
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Office/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.7 High
AI Score
Confidence
High
0.746 High
EPSS
Percentile
98.2%