Office Spoofing Vulnerability Allows Attackers to Execute Malicious Code

CVE-2024-38200
6.5MEDIUM

Key Information

Vendor
Microsoft
Status
Microsoft Office 2019
Microsoft 365 Apps For Enterprise
Microsoft Office Ltsc 2021
Microsoft Office 2016
Vendor
CVE Published:
12 August 2024

Badges

👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The Office Spoofing Vulnerability (CVE-2024-38200) has been discovered and exploited in Microsoft Office 2016, Microsoft Office LTSC 2021, Microsoft 365 Apps for Enterprise, and Microsoft Office 2019. It is a zero-day flaw that allows unauthorized disclosure of sensitive information when successfully exploited. The exploit can be enacted through a specially crafted file hosted on a compromised or attacking website, and would generally require user interaction to be successful. A patch is expected on August 13, but a mitigation solution has been identified and implemented. Microsoft is also working on addressing two other zero-day vulnerabilities. This could be part of a larger trend of zero-day exploits targeting Microsoft software, underscoring the importance of timely patching and security awareness.

Affected Version(s)

Microsoft Office 2019 < 19.0.0

Microsoft 365 Apps for Enterprise < 16.0.1

Microsoft Office LTSC 2021 < 16.0.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Risk change from: 7.5 to: 6.5 - (MEDIUM)

  • Vulnerability published.

  • First article discovered by News.de

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed1 Proof of Concept(s)15 News Article(s)
.