Lucene search

K
kasperskyKaspersky LabKLA60562
HistorySep 12, 2023 - 12:00 a.m.

KLA60562 Multiple vulnerabilities in Microsoft Office

2023-09-1200:00:00
Kaspersky Lab
threats.kaspersky.com
27
microsoft office
vulnerabilities
high severity
public exploits
affected products
update
kb list
office account
original advisories
impacts
kaspersky
cve-ids
critical
ace

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.629

Percentile

97.9%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, spoof user interface, gain privileges, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
  2. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  3. A spoofing vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
  4. An information disclosure vulnerability in Microsoft Outlook can be exploited remotely to obtain sensitive information.
  5. An elevation of privilege vulnerability in Microsoft Office can be exploited remotely to gain privileges.
  6. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  7. An information disclosure vulnerability in Microsoft Word can be exploited remotely to obtain sensitive information.
  8. An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.
  9. Heap buffer overflow vulnerability in WebP can be exploited to cause denial of service.

Original advisories

CVE-2023-36766

CVE-2023-36767

CVE-2023-41764

CVE-2023-36763

CVE-2023-36765

CVE-2023-36762

CVE-2023-36761

CVE-2023-36764

CVE-2023-4863

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Office

Microsoft-Outlook

Microsoft-Excel

Microsoft-Word

Microsoft-SharePoint

CVE list

CVE-2023-4863 critical

CVE-2023-36766 high

CVE-2023-36767 warning

CVE-2023-41764 high

CVE-2023-36763 critical

CVE-2023-36765 critical

CVE-2023-36762 high

CVE-2023-36761 high

CVE-2023-36764 critical

KB list

5002499

5002472

5002470

5002100

5002498

5002494

5002497

5002496

5002457

5002501

5002488

5002474

5002483

5002477

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)

Install Office updates

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Excel 2016 (64-bit edition)Microsoft SharePoint Server Subscription EditionMicrosoft Office 2019 for 64-bit editionsMicrosoft Office 2019 for 32-bit editionsMicrosoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft SharePoint Server 2019Microsoft Excel 2013 Service Pack 1 (32-bit editions)Microsoft Office Online ServerMicrosoft Office LTSC 2021 for 64-bit editionsMicrosoft Office LTSC for Mac 2021Microsoft Excel 2016 (32-bit edition)Microsoft Word 2013 RT Service Pack 1Microsoft Office 2016 (32-bit edition)Microsoft Outlook 2016 (64-bit edition)Microsoft SharePoint Enterprise Server 2016Microsoft Word 2013 Service Pack 1 (32-bit editions)Microsoft Word 2016 (64-bit edition)Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Outlook 2016 (32-bit edition)Microsoft Office 2016 (64-bit edition)Microsoft Word 2016 (32-bit edition)Microsoft Office LTSC 2021 for 32-bit editionsMicrosoft Office 2013 Service Pack 1 (64-bit editions)Microsoft Word 2013 Service Pack 1 (64-bit editions)Microsoft Office 2019 for MacMicrosoft Excel 2013 Service Pack 1 (64-bit editions)Microsoft Office 2013 Service Pack 1 (32-bit editions)Microsoft Office 2013 RT Service Pack 1Microsoft Excel 2013 RT Service Pack 1Microsoft Teams for DesktopMicrosoft SkypeMicrosoft Teams for Mac

References

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.629

Percentile

97.9%