Описание
Microsoft Office Click-To-Run Remote Code Execution Vulnerability
Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
Are there additional steps I need to take to be protected from this vulnerability?
Customers should download the latest Office Deployment Tool (ODT) and ensure that this version, or any newer version, is used for all future deployments to remain protected against CVE-2026-20943.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
A user would need to be tricked into opening a folder that contains a specially crafted file.
Is the Preview Pane an attack vector for this vulnerability?
No, the Preview Pane is not an attack vector.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Office 2016 (32-bit edition) | ||
| Microsoft Office 2016 (64-bit edition) | ||
| Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft SharePoint Server 2019 | ||
| Microsoft SharePoint Server Subscription Edition | ||
| Microsoft Office Deployment Tool | - |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
7 High
CVSS3
Связанные уязвимости
Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.
Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.
Уязвимость службы Click-to-Run (C2R) пакетов программ Microsoft Office и Microsoft SharePoint Server, позволяющая нарушителю повысить свои привилегии
EPSS
7 High
CVSS3