Lucene search

K
kasperskyKaspersky LabKLA12220
HistoryJul 13, 2021 - 12:00 a.m.

KLA12220 Multiple vulnerabilities in Microsoft Office

2021-07-1300:00:00
Kaspersky Lab
threats.kaspersky.com
29
microsoft office
vulnerabilities
arbitrary code execution
user interface spoofing
security restrictions bypass
information disclosure
remote exploitation
malware
related products
cve-2021-34452
cve-2021-34520
cve-2021-34451
cve-2021-34467
cve-2021-34469
cve-2021-34517
cve-2021-34468
cve-2021-34519
cve-2021-34518
cve-2021-34501
microsoft word
microsoft excel
microsoft sharepoint server
microsoft office online server
windows update.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

AI Score

8.3

Confidence

High

EPSS

0.517

Percentile

97.6%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft Office Online Server can be exploited remotely to spoof user interface.
  4. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  5. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  6. An information disclosure vulnerability in Microsoft SharePoint Server can be exploited remotely to obtain sensitive information.
  7. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2021-34452

CVE-2021-34520

CVE-2021-34451

CVE-2021-34467

CVE-2021-34469

CVE-2021-34517

CVE-2021-34468

CVE-2021-34519

CVE-2021-34518

CVE-2021-34501

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office

Microsoft-Excel

Microsoft-Word

CVE list

CVE-2021-34452 critical

CVE-2021-34520 critical

CVE-2021-34451 high

CVE-2021-34467 high

CVE-2021-34469 critical

CVE-2021-34517 high

CVE-2021-34468 high

CVE-2021-34519 high

CVE-2021-34518 critical

CVE-2021-34501 critical

KB list

5001949

5001981

5001993

5001973

5001983

5001996

5001977

5001992

5001984

5001979

5001975

5001976

5001986

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Word 2016 (64-bit edition)Microsoft Office 2013 RT Service Pack 1Microsoft SharePoint Foundation 2013 Service Pack 1Microsoft SharePoint Server 2019Microsoft SharePoint Enterprise Server 2016Microsoft Word 2016 (32-bit edition)Microsoft Office 2019 for 64-bit editionsMicrosoft Office 2013 Service Pack 1 (64-bit editions)Microsoft Office 2016 (64-bit edition)Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Office 2019 for MacMicrosoft Office Online ServerMicrosoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft Excel 2013 Service Pack 1 (64-bit editions)Microsoft Excel 2013 RT Service Pack 1Microsoft Office 2019 for 32-bit editionsMicrosoft Office 2013 Service Pack 1 (32-bit editions)Microsoft Excel 2013 Service Pack 1 (32-bit editions)Microsoft Excel 2016 (32-bit edition)Microsoft Excel 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Microsoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office Web Apps Server 2013 Service Pack 1

References

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N

AI Score

8.3

Confidence

High

EPSS

0.517

Percentile

97.6%