6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.089 Low
EPSS
Percentile
94.6%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
CVE-2021-31940 critical
CVE-2021-31949 high
CVE-2021-26420 high
CVE-2021-31948 critical
CVE-2021-31966 high
CVE-2021-31939 critical
CVE-2021-31965 high
CVE-2021-31941 critical
CVE-2021-31963 high
CVE-2021-31964 critical
CVE-2021-31950 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/4011698
support.microsoft.com/kb/5001922
support.microsoft.com/kb/5001934
support.microsoft.com/kb/5001939
support.microsoft.com/kb/5001942
support.microsoft.com/kb/5001943
support.microsoft.com/kb/5001944
support.microsoft.com/kb/5001945
support.microsoft.com/kb/5001946
support.microsoft.com/kb/5001947
support.microsoft.com/kb/5001950
support.microsoft.com/kb/5001951
support.microsoft.com/kb/5001953
support.microsoft.com/kb/5001954
support.microsoft.com/kb/5001955
support.microsoft.com/kb/5001956
support.microsoft.com/kb/5001962
support.microsoft.com/kb/5001963
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26420
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31939
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31940
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31941
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31948
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31949
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31950
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31963
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31964
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31965
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31966
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.089 Low
EPSS
Percentile
94.6%