Описание
Microsoft Excel Remote Code Execution Vulnerability
FAQ
Is the Preview Pane an attack vector for this vulnerability?
No, the Preview Pane is not an attack vector.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel.
- In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
- In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Excel 2010 Service Pack 2 (32-bit editions) | ||
| Microsoft Excel 2010 Service Pack 2 (64-bit editions) | ||
| Microsoft Office 2010 Service Pack 2 (32-bit editions) | ||
| Microsoft Office 2010 Service Pack 2 (64-bit editions) | ||
| Microsoft Office 2013 Service Pack 1 (32-bit editions) | ||
| Microsoft Office 2013 Service Pack 1 (64-bit editions) | ||
| Microsoft Office 2013 RT Service Pack 1 | - | |
| Microsoft Office Web Apps Server 2013 Service Pack 1 | ||
| Microsoft Excel 2013 Service Pack 1 (32-bit editions) | ||
| Microsoft Excel 2013 Service Pack 1 (64-bit editions) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
7.8 High
CVSS3
Связанные уязвимости
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28451.
Уязвимость реализации синтаксического анализа файлов формата XLS пакетов программ Microsoft Office, Microsoft Office Web Apps Server, Microsoft Excel, Microsoft 365 Apps for Enterprise и Microsoft Office Online Server, позволяющая нарушителю выполнить произвольный код
EPSS
7.8 High
CVSS3