9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
Low
0.362 Low
EPSS
Percentile
97.2%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2021-24104 warning
CVE-2021-27053 critical
CVE-2021-27052 high
CVE-2021-27059 critical
CVE-2021-27054 critical
CVE-2021-27055 high
CVE-2021-27057 critical
CVE-2021-27056 critical
CVE-2021-27058 critical
CVE-2021-27076 critical
CVE-2021-24108 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/3101541
support.microsoft.com/kb/4484376
support.microsoft.com/kb/4486673
support.microsoft.com/kb/4493151
support.microsoft.com/kb/4493177
support.microsoft.com/kb/4493199
support.microsoft.com/kb/4493200
support.microsoft.com/kb/4493203
support.microsoft.com/kb/4493214
support.microsoft.com/kb/4493224
support.microsoft.com/kb/4493225
support.microsoft.com/kb/4493227
support.microsoft.com/kb/4493228
support.microsoft.com/kb/4493229
support.microsoft.com/kb/4493230
support.microsoft.com/kb/4493231
support.microsoft.com/kb/4493232
support.microsoft.com/kb/4493233
support.microsoft.com/kb/4493234
support.microsoft.com/kb/4493238
support.microsoft.com/kb/4493239
support.microsoft.com/kb/4504702
support.microsoft.com/kb/4504703
support.microsoft.com/kb/4504707
nvd.nist.gov/vuln/detail/CVE-2021-24104
nvd.nist.gov/vuln/detail/CVE-2021-24108
nvd.nist.gov/vuln/detail/CVE-2021-27052
nvd.nist.gov/vuln/detail/CVE-2021-27053
nvd.nist.gov/vuln/detail/CVE-2021-27054
nvd.nist.gov/vuln/detail/CVE-2021-27055
nvd.nist.gov/vuln/detail/CVE-2021-27056
nvd.nist.gov/vuln/detail/CVE-2021-27057
nvd.nist.gov/vuln/detail/CVE-2021-27058
nvd.nist.gov/vuln/detail/CVE-2021-27059
nvd.nist.gov/vuln/detail/CVE-2021-27076
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Visio-2010/
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
Low
0.362 Low
EPSS
Percentile
97.2%