⚠ Actively exploited
Added to CISA KEV on 2022-02-25. Federal agencies required to patch by 2022-08-25. Required action: Apply updates per vendor instructions..

CVE-2017-8570Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Business Productivity Servers

Severity
7.8HIGHNVD
EPSS
94.2%
top 0.07%
CISA KEV
KEV
Added 2022-02-25
Due 2022-08-25
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJul 11
KEV addedFeb 25
KEV dueAug 25
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Patches

🔴Vulnerability Details

3
GHSA
GHSA-c2m8-mp3j-qvvc: Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Exec2022-05-17
GHSA
GHSA-p72w-9mwc-fgvp: Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Exec2022-05-13
VulnCheck
Microsoft Office Remote Code Execution Vulnerability2017

💥Exploits & PoCs

1
Exploit-DB
Microsoft Office - 'Composite Moniker Remote Code Execution2018-01-09

📋Vendor Advisories

2
CISA
Microsoft Office Remote Code Execution Vulnerability2022-02-25
Microsoft
Microsoft Office Remote Code Execution Vulnerability2017-07-11

🕵️Threat Intelligence

51
Securelist
PC malware statistics, Q3 20232023-12-01
Securelist
IT threat evolution in Q3 2023. Non-mobile statistics2023-12-01
Qualys
Top 20 Vulnerabilities Exploited by Cyber Attackers | Qualys2023-09-04
Qualys
Qualys Top 20 Most Exploited Vulnerabilities2023-09-04
Securelist
IT threat evolution in Q2 2023. Non-mobile statistics2023-08-30

📄Research Papers

2
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12
arXiv
An Analysis of Malware Trends in Enterprise Networks2019-10-01