Lucene search

K
kasperskyKaspersky LabKLA12606
HistoryAug 09, 2022 - 12:00 a.m.

KLA12606 Multiple vulnerabilities in Microsoft Office

2022-08-0900:00:00
Kaspersky Lab
threats.kaspersky.com
25

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

88.0%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  3. A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
  4. A denial of service vulnerability in Microsoft Outlook can be exploited remotely to cause denial of service.

Original advisories

CVE-2022-34717

CVE-2022-33648

CVE-2022-33631

CVE-2022-35742

Related products

Microsoft-Office

Microsoft-Outlook

Microsoft-Excel

CVE list

CVE-2022-34717 critical

CVE-2022-33648 critical

CVE-2022-33631 high

CVE-2022-35742 critical

KB list

5001990

5002051

4462142

5002228

5002232

5002242

4462148

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Microsoft Outlook 2013 RT Service Pack 1Microsoft Excel 2013 Service Pack 1 (64-bit editions)Microsoft Excel 2013 RT Service Pack 1Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Outlook 2013 Service Pack 1 (32-bit editions)Microsoft Outlook 2013 Service Pack 1 (64-bit editions)Microsoft Office LTSC 2021 for 32-bit editionsMicrosoft Excel 2016 (64-bit edition)Microsoft Outlook 2016 (64-bit edition)Microsoft Office 2019 for 32-bit editionsMicrosoft Office Online ServerMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office 2013 RT Service Pack 1Microsoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2013 Service Pack 1 (32-bit editions)Microsoft Excel 2013 Service Pack 1 (32-bit editions)Microsoft Office 2019 for 64-bit editionsMicrosoft Office 2016 (32-bit edition)Microsoft Office 2016 (64-bit edition)Microsoft Excel 2016 (32-bit edition)Microsoft Outlook 2016 (32-bit edition)Microsoft Office 2013 Service Pack 1 (64-bit editions)

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

88.0%