Описание
Microsoft Excel Remote Code Execution Vulnerability
FAQ
Is the Preview Pane an attack vector for this vulnerability?
No, the Preview Pane is not an attack vector.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Excel 2010 Service Pack 2 (32-bit editions) | ||
| Microsoft Excel 2010 Service Pack 2 (64-bit editions) | ||
| Microsoft Office Web Apps Server 2013 Service Pack 1 | ||
| Microsoft Excel 2013 Service Pack 1 (32-bit editions) | ||
| Microsoft Excel 2013 Service Pack 1 (64-bit editions) | ||
| Microsoft Excel 2013 RT Service Pack 1 | - | |
| Microsoft Excel 2016 (32-bit edition) | ||
| Microsoft Excel 2016 (64-bit edition) | ||
| Office Online Server | ||
| Microsoft Office 2019 for 32-bit editions | - |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
7.8 High
CVSS3
Связанные уязвимости
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24069.
Уязвимость пакетов программ Microsoft Excel, Office, 365 Apps for Enterprise, Office Web Apps Server и Office Online Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
EPSS
7.8 High
CVSS3