CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
96.2%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
CVE-2022-22716 high
CVE-2022-23252 high
CVE-2022-21965 critical
CVE-2022-21988 critical
CVE-2022-21968 warning
CVE-2022-23280 high
CVE-2022-22003 critical
CVE-2022-22005 critical
CVE-2022-23255 high
CVE-2022-21987 critical
CVE-2022-22004 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/3118335
support.microsoft.com/kb/3172514
support.microsoft.com/kb/5002120
support.microsoft.com/kb/5002133
support.microsoft.com/kb/5002135
support.microsoft.com/kb/5002136
support.microsoft.com/kb/5002137
support.microsoft.com/kb/5002140
support.microsoft.com/kb/5002145
support.microsoft.com/kb/5002146
support.microsoft.com/kb/5002147
support.microsoft.com/kb/5002149
support.microsoft.com/kb/5002155
support.microsoft.com/kb/5002156
nvd.nist.gov/vuln/detail/CVE-2022-21965
nvd.nist.gov/vuln/detail/CVE-2022-21968
nvd.nist.gov/vuln/detail/CVE-2022-21987
nvd.nist.gov/vuln/detail/CVE-2022-21988
nvd.nist.gov/vuln/detail/CVE-2022-22003
nvd.nist.gov/vuln/detail/CVE-2022-22004
nvd.nist.gov/vuln/detail/CVE-2022-22005
nvd.nist.gov/vuln/detail/CVE-2022-22716
nvd.nist.gov/vuln/detail/CVE-2022-23252
nvd.nist.gov/vuln/detail/CVE-2022-23255
nvd.nist.gov/vuln/detail/CVE-2022-23280
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
threats.kaspersky.com/en/product/Microsoft-SharePoint/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
96.2%