CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
97.0%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
CVE-2018-8310 warning
CVE-2018-8281 critical
CVE-2018-8311 high
CVE-2018-8312 critical
CVE-2018-8323 warning
CVE-2018-8238 critical
CVE-2018-8300 high
CVE-2018-8299 warning
CVE-2018-8284 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4011202
support.microsoft.com/kb/4018338
support.microsoft.com/kb/4018351
support.microsoft.com/kb/4022200
support.microsoft.com/kb/4022202
support.microsoft.com/kb/4022218
support.microsoft.com/kb/4022221
support.microsoft.com/kb/4022224
support.microsoft.com/kb/4022225
support.microsoft.com/kb/4022228
support.microsoft.com/kb/4022235
support.microsoft.com/kb/4022243
support.microsoft.com/kb/4032214
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8238
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8281
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8284
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8299
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8300
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8310
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8311
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8312
msrc.microsoft.com/update-guide/vulnerability/CVE-2018-8323
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Access/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Lync/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-SharePoint/
threats.kaspersky.com/en/product/Microsoft-Word/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
97.0%