CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
91.4%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2019-0824 high
CVE-2019-0825 high
CVE-2019-0831 warning
CVE-2019-0822 critical
CVE-2019-0823 high
CVE-2019-0828 critical
CVE-2019-0801 high
CVE-2019-0826 high
CVE-2019-0827 high
CVE-2019-0830 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4462204
support.microsoft.com/kb/4462209
support.microsoft.com/kb/4462213
support.microsoft.com/kb/4462223
support.microsoft.com/kb/4462230
support.microsoft.com/kb/4462236
support.microsoft.com/kb/4462242
support.microsoft.com/kb/4464504
support.microsoft.com/kb/4464510
support.microsoft.com/kb/4464511
support.microsoft.com/kb/4464515
support.microsoft.com/kb/4464518
support.microsoft.com/kb/4464520
support.microsoft.com/kb/4464525
support.microsoft.com/kb/4464528
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0801
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0822
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0823
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0824
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0825
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0826
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0827
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0828
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0830
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0831
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Sharepoint-Server/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
91.4%