Описание
Microsoft Office Security Feature Bypass Vulnerability
FAQ
There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?
Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.
What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploits this vulnerability could bypass Windows Defender Application Control (WDAC) enforcement. This could lead to the ability to run unauthorized applications on target systems.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malicious file and convince them to open it.
Is the Preview Pane an attack vector for this vulnerability?
No, the Preview Pane is not an attack vector.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Microsoft Office 2016 (32-bit edition) | ||
Microsoft Office 2016 (64-bit edition) | ||
Microsoft Office 2019 for 32-bit editions | - | |
Microsoft Office 2019 for 64-bit editions | - | |
Microsoft 365 Apps for Enterprise for 32-bit Systems | - | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | - | |
Microsoft Office LTSC 2021 for 64-bit editions | - | |
Microsoft Office LTSC 2021 for 32-bit editions | - | |
Microsoft Office LTSC 2024 for 32-bit editions | - | |
Microsoft Office LTSC 2024 for 64-bit editions | - |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
7.1 High
CVSS3
Связанные уязвимости
Microsoft Office Security Feature Bypass Vulnerability
EPSS
7.1 High
CVSS3