Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2023-21734 CVE-2023-21735 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Office LTSC for Mac Client/Desktop applications / Office applications Microsoft Office Client/Desktop applications / Office applications Microsoft 365 Apps for Enterprise Client/Desktop applications / Other client software |
Vendor | Microsoft |
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU70969
Risk: High
CVSSv3.1:
CVE-ID: CVE-2023-21734
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Office. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOffice LTSC for Mac: 2019
Microsoft Office: 2019 for Mac
Microsoft 365 Apps for Enterprise: 32-bit Systems - 64-bit Systems
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21734
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70970
Risk: High
CVSSv3.1:
CVE-ID: CVE-2023-21735
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Office. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOffice LTSC for Mac: 2019
Microsoft Office: 2019 for Mac
Microsoft 365 Apps for Enterprise: 32-bit Systems - 64-bit Systems
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21735
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?