6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.005 Low
EPSS
Percentile
76.0%
The Microsoft Office Products are missing security updates. It is, therefore, affected by a remote code execution vulnerability. An authenticated attacker can exploit this to execute arbitrary code on the system.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Microsoft Security Updates API. The text
# itself is copyright (C) Microsoft Corporation.
##
include('compat.inc');
if (description)
{
script_id(162312);
script_version("1.11");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/20");
script_cve_id("CVE-2022-30174");
script_xref(name:"IAVA", value:"2022-A-0239-S");
script_name(english:"Security Updates for Microsoft Office Products C2R (June 2022)");
script_set_attribute(attribute:"synopsis", value:
"The Microsoft Office Products are affected by a remote code execution vulnerability.");
script_set_attribute(attribute:"description", value:
"The Microsoft Office Products are missing security updates. It is, therefore, affected by a remote code execution
vulnerability. An authenticated attacker can exploit this to execute arbitrary code on the system.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://docs.microsoft.com/en-us/officeupdates/update-history-microsoft365-apps-by-date
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fd4508ff");
# https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates#june-14-2022
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bf73864f");
script_set_attribute(attribute:"solution", value:
"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and
manually perform an update.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-30174");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/06/14");
script_set_attribute(attribute:"patch_publication_date", value:"2022/06/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/06/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:office");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("office_installed.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, "Host/patch_management_checks");
exit(0);
}
include('vcf_extras_office.inc');
var bulletin = 'MS22-06';
var app_info = vcf::microsoft::office::get_app_info(app:'Microsoft Office');
var constraints = [
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.15225.20288','channel':'2016 Retail'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.15225.20288','channel':'Current'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.15128.20280','channel':'Enterprise Deferred','channel_version':'2204'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.15028.20282','channel':'Enterprise Deferred'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.14931.20494','channel':'First Release for Deferred'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.14326.21018','channel':'Deferred','channel_version':'2108'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13801.21418','channel':'Deferred'},
{'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.22162','channel':'Microsoft 365 Apps on Windows 7'},
{'product':'Microsoft Office 2021','file':'graph.exe','fixed_version':'16.0.15225.20288','channel':'2021 Retail'},
{'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.15225.20288','channel':'2019 Retail'},
{'product':'Microsoft Office 2021','file':'graph.exe','fixed_version':'16.0.14332.20324','channel':'LTSC 2021'},
{'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.10387.20023','channel':'2019 Volume'}
];
vcf::microsoft::office::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_WARNING,
bulletin:bulletin,
subproduct:'Office'
);
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.005 Low
EPSS
Percentile
76.0%