CVE-2020-1458: Microsoft Office Remote Code Execution Vulnerability

Overview

Severity
N/A
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2020-Jul
Released
2020-07-14
EPSS Score
8.87% (percentile: 92.6%)

Description

A remote code execution vulnerability exists when Microsoft Office improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To exploit the vulnerability, an attacker must first convince a user to open a specially crafted Office document. The updates address the vulnerability by correcting how Office validates input before loading DLL files.

FAQ

Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector.

Affected Products (2)

Microsoft Office

  • Microsoft 365 Apps for Enterprise for 32-bit Systems
  • Microsoft 365 Apps for Enterprise for 64-bit Systems

Acknowledgments

Dhiraj Mishra <a href="https://twitter.com/RandomDhiraj"> @RandomDhiraj </a>

Revision History

  • 2020-07-14: Information published.