CVE-2023-36413: Microsoft Office Security Feature Bypass Vulnerability

Overview

Severity
Medium (CVSS 6.5)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
Category
Security Feature Bypass
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Publicly Disclosed
Yes
Patch Tuesday
2023-Nov
Released
2023-11-14
EPSS Score
2.67% (percentile: 85.8%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. What kind of security feature could be bypassed by successfully exploiting this vulnerability? Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.

Affected Products (8)

Microsoft Office

  • Microsoft Office 2019 for 32-bit editions
  • Microsoft Office 2019 for 64-bit editions
  • Microsoft 365 Apps for Enterprise for 32-bit Systems
  • Microsoft 365 Apps for Enterprise for 64-bit Systems
  • Microsoft Office LTSC 2021 for 64-bit editions
  • Microsoft Office LTSC 2021 for 32-bit editions
  • Microsoft Office 2016 (32-bit edition)
  • Microsoft Office 2016 (64-bit edition)

Security Updates (2)

Acknowledgments

<a href="https://twitter.com/Edu_Braun_0day">Eduardo Braun Prado</a>, <a href="https://twitter.com/wdormann">Will Dormann</a> with <a href="https://vu.ls/">Vul Labs</a>

Revision History

  • 2023-11-14: Information published.