CVE-2020-1218

CWE-94Code Injection4 documents4 sources
Severity
8.8HIGH
EPSS
12.2%
top 6.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateMay 24

Description

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected versio

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages20 packages

CVEListV5microsoft/microsoft_word_201616.0.1publication
CVEListV5microsoft/microsoft_word_2010_service_pack_213.0.0.0publication
CVEListV5microsoft/microsoft_word_2013_service_pack_115.0.1publication
NVDmicrosoft/word2010, 2013, 2016+2
CVEListV5microsoft/microsoft_office_201919.0.0https://aka.ms/OfficeSecurityReleases

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6j43-825c-cv2c: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote2022-05-24
CVEList
Microsoft Word Remote Code Execution Vulnerability2020-09-11

📋Vendor Advisories

1
Microsoft
Microsoft Word Remote Code Execution Vulnerability2020-09-08