#VU15547 Logic error in Microsoft Office and Microsoft Word 

 

#VU15547 Logic error in Microsoft Office and Microsoft Word

Published: October 26, 2018 / Updated: November 15, 2018


Vulnerability identifier: #VU15547
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: N/A
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
Microsoft Office
Microsoft Word
Software vendor:
Microsoft

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to a logical bug is revealed when embedding a video via the 'online video' feature. A remote attacker can embed a video inside a Word document, edit the XML file named document.xml, replace the video link with a crafted payload created by the attacker which opens Internet Explorer Download Manager with the embedded code execution file and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Note: as of October 31, 2018 the vulnerability is being actively exploited in the wild.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
To avoid the vulnerability users are recommended to block Word documents containing an embedded video.

External links