First published: Mon Jul 15 2019(Updated: )
A spoofing vulnerability exists when Microsoft Office Javascript does not check the validity of the web page making a request to Office documents.An attacker who successfully exploited this vulnerability could read or write information in Office documents.The security update addresses the vulnerability by correcting the way that Microsoft Office Javascript verifies trusted web pages., aka 'Microsoft Office Spoofing Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2016 | |
Microsoft Office | =2019 | |
Microsoft Office 365 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1109 is a spoofing vulnerability in Microsoft Office Javascript that allows attackers to read or write information in Office documents.
CVE-2019-1109 affects Microsoft Office 2013 SP1, Office 2016, Office 2019, and Office 365 ProPlus.
CVE-2019-1109 has a severity level of 9.1, which is considered critical.
To fix CVE-2019-1109, apply the security update provided by Microsoft.
You can find more information about CVE-2019-1109 at the following link: [CVE-2019-1109](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1109).