CVE-2021-34468: Microsoft SharePoint Server Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.1)
CVSS Vector
CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Patch Tuesday
2021-Jul
Released
2021-07-13
EPSS Score
1.18% (percentile: 78.8%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

Affected Products (3)

Microsoft Office

  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Foundation 2013 Service Pack 1

Security Updates (3)

Acknowledgments

Steven Seeley (mr_me) of Source Incite working with Trend Micro Zero Day Initiative

Revision History

  • 2021-07-13: Information published.