CVE-2020-16933

Severity
8.8HIGH
EPSS
4.4%
top 10.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages11 packages

CVEListV5microsoft/microsoft_word_201616.0.1publication
CVEListV5microsoft/microsoft_word_2010_service_pack_213.0.0.0publication
CVEListV5microsoft/microsoft_word_2013_service_pack_115.0.1publication
NVDmicrosoft/word2010, 2013, 2016+2
CVEListV5microsoft/microsoft_office_201919.0.0https://aka.ms/OfficeSecurityReleases

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3fp4-rv66-mvj2: A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle2022-05-24
CVEList
Microsoft Word Security Feature Bypass Vulnerability2020-10-16

📋Vendor Advisories

1
Microsoft
Microsoft Word Security Feature Bypass Vulnerability2020-10-13