CVE-2024-43609: Microsoft Office Spoofing Vulnerability

Overview

Severity
Medium (CVSS 6.5)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Patch Tuesday
2024-Oct
Released
2024-10-08
EPSS Score
10.55% (percentile: 93.3%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

Affected Products (10)

Microsoft Office

  • Microsoft Office LTSC 2024 for 64-bit editions
  • Microsoft Office LTSC 2024 for 32-bit editions
  • Microsoft Office 2019 for 32-bit editions
  • Microsoft Office 2019 for 64-bit editions
  • Microsoft 365 Apps for Enterprise for 32-bit Systems
  • Microsoft 365 Apps for Enterprise for 64-bit Systems
  • Microsoft Office LTSC 2021 for 64-bit editions
  • Microsoft Office LTSC 2021 for 32-bit editions
  • Microsoft Office 2016 (32-bit edition)
  • Microsoft Office 2016 (64-bit edition)

Security Updates (2)

Acknowledgments

<a href="https://www.linkedin.com/in/arnoldosipov/">Arnold Osipov</a> with <a href="https://www.morphisec.com/">Morphisec</a>, <a href="https://www.linkedin.com/in/smgoreli">Michael Gorelik</a> with <a href="https://www.morphisec.com/">Morphisec</a>, <a href="https://tr.linkedin.com/in/metinyunuskandemir">Metin Yunus Kandemir</a> with <a href="https://docs.unsafe-inline.com/">unsafe-inline</a>

Revision History

  • 2024-10-08: Information published.