7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
Low
0.707 High
EPSS
Percentile
98.1%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-29344 critical
CVE-2023-24955 high
CVE-2023-29333 warning
CVE-2023-24881 high
CVE-2023-24953 critical
CVE-2023-24950 high
CVE-2023-24954 high
CVE-2023-29335 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5002365
support.microsoft.com/kb/5002369
support.microsoft.com/kb/5002372
support.microsoft.com/kb/5002384
support.microsoft.com/kb/5002386
support.microsoft.com/kb/5002389
support.microsoft.com/kb/5002390
support.microsoft.com/kb/5002397
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24881
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24950
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24953
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29333
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29344
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-SharePoint/
threats.kaspersky.com/en/product/Microsoft-Word/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
Low
0.707 High
EPSS
Percentile
98.1%