Detect date
?
|
02/14/2023 |
Severity
?
|
Critical |
Description
|
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, bypass security restrictions. Below is a complete list of vulnerabilities:
|
Exploitation
|
The following public exploits exists for this vulnerability: https://github.com/Elizarfish/CVE-2023-21823 https://github.com/FeatherStark/CVE-2023-21716 https://github.com/JMousqueton/CVE-2023-21716 https://github.com/gyaansastra/CVE-2023-21716 https://github.com/mikesxrs/CVE-2023-21716_YARA_Results https://github.com/Xnuvers007/CVE-2023-21716 https://github.com/hv0l/CVE-2023-21716_exploit https://github.com/maldev866/WordExp_CVE_2023_21716 https://github.com/CKevens/CVE-2023-21716-POC Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Affected products
|
Microsoft Office for iOS |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2023-21714 |
Impacts
?
|
ACE [?] OSI [?] SB [?] PE [?] SUI [?] |
Related products
|
Microsoft Office Microsoft Word Microsoft SharePoint |
CVE-IDS
?
|
CVE-2023-218235.0Critical
CVE-2023-217145.0Critical CVE-2023-217165.0Critical CVE-2023-217215.0Critical CVE-2023-217155.0Critical CVE-2023-217175.0Critical |
KB list
|
5002323 |
Microsoft official advisories
|
Microsoft Security Update Guide |
Find out the statistics of the vulnerabilities spreading in your region |