Remote Code Execution Vulnerability Affects Microsoft Word
CVE-2023-21716

9.8CRITICAL

Key Information:

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 29%πŸ“° News Worthy

Summary

The vulnerability in Microsoft Word can allow an attacker to execute remote code on a user's machine, potentially leading to data breaches and unauthorized access. This issue primarily arises due to improper validation of user input in documents. Users are urged to update their Word applications promptly to mitigate the risk of exploitation.

Affected Version(s)

Microsoft 365 Apps for Enterprise 32-bit Systems 16.0.1

Microsoft Office 2019 for Mac Unknown 16.0.0 < 16.70.23021201

Microsoft Office 2019 x64-based Systems 19.0.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716) - Help Net Security

A PoC for CVE-2023-21716, a RCE vulnerability in Microsoft Word that can be exploited via a malicious RTF document, is publicly available.

References

EPSS Score

29% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by Help Net Security

  • Vulnerability published

  • Vulnerability Reserved

.