⚠ Actively exploited
Added to CISA KEV on 2022-02-10. Federal agencies required to patch by 2022-08-10. Required action: Apply updates per vendor instructions..

CVE-2017-0262Use After Free in Corporation Microsoft Office

CWE-416Use After Free22 documents11 sources
Severity
7.8HIGHNVD
EPSS
64.3%
top 1.55%
CISA KEV
KEV
Added 2022-02-10
Due 2022-08-10
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMay 12
KEV addedFeb 10
Latest updateJun 21
KEV dueAug 10
CISA Required Action: Apply updates per vendor instructions.

Description

Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Patches

🔴Vulnerability Details

4
GHSA
GHSA-gq33-m2fg-cpvh: Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2016, Office Online Server 2016, Office Web Apps 2010 SP2,Office Web Apps 2013 SP12022-05-13
GHSA
GHSA-vmqq-f768-gx47: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle obj2022-05-13
GHSA
GHSA-vxg6-wq4c-3428: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle obj2022-05-13
VulnCheck
Microsoft Office Remote Code Execution Vulnerability2017

📋Vendor Advisories

2
CISA
Microsoft Office Remote Code Execution Vulnerability2022-02-10
Microsoft
Microsoft Office Remote Code Execution Vulnerability2017-05-09

🕵️Threat Intelligence

12
Qualys
Managing CISA Known Exploited Vulnerabilities with Qualys VMDR | Qualys2022-02-23
Tenable
Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts2021-01-21
Securelist
A Slice of 2017 Sofacy Activity2018-02-20
Securelist
A Slice of 2017 Sofacy Activity2018-02-20
Securelist
IT threat evolution Q2 2017. Statistics2017-08-15

📄Research Papers

1
arXiv
Identification of Attack Paths Using Kill Chain and Attack Graphs2022-06-21