Lucene search

K
kasperskyKaspersky LabKLA68919
HistoryJun 11, 2024 - 12:00 a.m.

KLA68919 Multiple vulnerabilities in Microsoft Office

2024-06-1100:00:00
Kaspersky Lab
threats.kaspersky.com
6
arbitrary code execution
remote code execution
microsoft office
microsoft sharepoint
microsoft outlook
security update
cve-2024-30102
cve-2024-30104
cve-2024-30101
cve-2024-30100
cve-2024-30103
kb list

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

55.7%

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2024-30102

CVE-2024-30104

CVE-2024-30101

CVE-2024-30100

CVE-2024-30103

Related products

Microsoft-Office

Microsoft-Outlook

Microsoft-SharePoint

CVE list

CVE-2024-30102 high

CVE-2024-30104 high

CVE-2024-30101 high

CVE-2024-30100 high

CVE-2024-30103 high

KB list

5002600

5002591

5002604

5002603

5002602

5002575

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update component usually can be accessed from the Control Panel) and updates from the Update Options section, that are listed in your Office Account (Office Account tab usually can be accessed from the File menu)

Install Office updates

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

Affected Products

  • Microsoft Office 2016 (64-bit edition)Microsoft Office 2019 for 32-bit editionsMicrosoft Office LTSC 2021 for 32-bit editionsMicrosoft Outlook 2016 (64-bit edition)Microsoft 365 Apps for Enterprise for 32-bit SystemsMicrosoft Office 2019 for 64-bit editionsMicrosoft SharePoint Enterprise Server 2016Microsoft SharePoint Server 2019Microsoft Office LTSC 2021 for 64-bit editionsMicrosoft SharePoint Server Subscription EditionMicrosoft Office 2016 (32-bit edition)Microsoft 365 Apps for Enterprise for 64-bit SystemsMicrosoft Outlook 2016 (32-bit edition)

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

55.7%