First published: Fri Oct 16 2020(Updated: )
<p>An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files. An attacker who successfully exploited the vulnerability could elevate privileges.</p> <p>To exploit this vulnerability, an attacker would need to convince a user to open a specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle these files.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft 365 Apps | ||
Microsoft Office | =2013 | |
Microsoft Office | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16928 has a severity rating of Important according to Microsoft's vulnerability classification.
To mitigate CVE-2020-16928, users should update their Microsoft Office applications to the latest versions.
CVE-2020-16928 affects Microsoft 365 Apps, Microsoft Office 2013, and Microsoft Office 2019.
CVE-2020-16928 can be exploited through an elevation of privilege attack, allowing an attacker to gain higher access levels.
Yes, an attacker would need to convince a user to open a malicious file to exploit CVE-2020-16928.