CVE-2023-36413: Microsoft Office Security Feature Bypass Vulnerability
Overview
- Severity
- Medium (CVSS 6.5)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
- Category
- Security Feature Bypass
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- More Likely
- Publicly Disclosed
- Yes
- Patch Tuesday
- 2023-Nov
- Released
- 2023-11-14
- EPSS Score
- 2.67% (percentile: 85.8%)
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker must send the user a malicious file and convince them to open it.
What kind of security feature could be bypassed by successfully exploiting this vulnerability?
Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.
Affected Products (8)
Microsoft Office
- Microsoft Office 2019 for 32-bit editions
- Microsoft Office 2019 for 64-bit editions
- Microsoft 365 Apps for Enterprise for 32-bit Systems
- Microsoft 365 Apps for Enterprise for 64-bit Systems
- Microsoft Office LTSC 2021 for 64-bit editions
- Microsoft Office LTSC 2021 for 32-bit editions
- Microsoft Office 2016 (32-bit edition)
- Microsoft Office 2016 (64-bit edition)
Security Updates (2)
Acknowledgments
<a href="https://twitter.com/Edu_Braun_0day">Eduardo Braun Prado</a>, <a href="https://twitter.com/wdormann">Will Dormann</a> with <a href="https://vu.ls/">Vul Labs</a>
Revision History
- 2023-11-14: Information published.