Lucene search

K
kasperskyKaspersky LabKLA20229
HistoryFeb 14, 2023 - 12:00 a.m.

KLA20229 Multiple vulnerabilities in Microsoft Office

2023-02-1400:00:00
Kaspersky Lab
threats.kaspersky.com
76

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.645 Medium

EPSS

Percentile

97.9%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  2. An information disclosure vulnerability in Microsoft Office can be exploited remotely to obtain sensitive information.
  3. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  4. A spoofing vulnerability in Microsoft OneNote can be exploited remotely to spoof user interface.
  5. A security feature bypass vulnerability in Microsoft 365 Apps for Enterprise can be exploited remotely to bypass security restrictions.
  6. An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.

Original advisories

CVE-2023-21714

CVE-2023-21716

CVE-2023-21721

CVE-2023-21715

CVE-2023-21823

CVE-2023-21717

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office

Microsoft-Word

Microsoft-SharePoint

CVE list

CVE-2023-21823 critical

CVE-2023-21714 high

CVE-2023-21716 critical

CVE-2023-21721 high

CVE-2023-21715 high

CVE-2023-21717 critical

KB list

5002323

5002352

5002325

5002347

5002342

5002313

5002330

5002350

5002309

5002312

5002346

5002353

5002316

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Office for iOSMicrosoft Word 2013 Service Pack 1 (32-bit editions)Microsoft Word 2016 (32-bit edition)Microsoft Office Online ServerMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office for UniversalMicrosoft SharePoint Foundation 2013 Service Pack 1Microsoft Word 2013 RT Service Pack 1Microsoft Office 2019 for MacMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft SharePoint Enterprise Server 2016Microsoft SharePoint Enterprise Server 2013 Service Pack 1Microsoft OneNote for AndroidMicrosoft Office LTSC for Mac 2021SharePoint Server Subscription Edition Language PackMicrosoft Word 2016 (64-bit edition)Microsoft SharePoint Server 2019Microsoft Word 2013 Service Pack 1 (64-bit editions)Microsoft Office for AndroidMicrosoft Office Web Apps Server 2013 Service Pack 1Microsoft SharePoint Server Subscription EditionMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editions

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.645 Medium

EPSS

Percentile

97.9%