First published: Tue Nov 08 2022(Updated: )
Microsoft Word Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC for Mac 2021 | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Word 2013 RT | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps | ||
Microsoft Office | =2019 | |
Microsoft Office | =2021 | |
Microsoft Office | =2021 | |
Microsoft Office Online Server | ||
Microsoft Office Web Apps Server | =2013-sp1 | |
Microsoft SharePoint Enterprise Server | =2013-sp1 | |
Microsoft SharePoint Enterprise Server | =2016 | |
Microsoft SharePoint Server | ||
Microsoft SharePoint Server | =2019 | |
Microsoft Word | =2013-sp1 | |
Microsoft Word | =2013-sp1 | |
Microsoft Word | =2016 | |
Microsoft Word 2016 | ||
Microsoft Office Online Server | ||
Microsoft Word 2013 | ||
Microsoft SharePoint Server 2019 | ||
Microsoft SharePoint Server Subscription Edition Language Pack | ||
Microsoft SharePoint Enterprise Server 2013 | ||
Microsoft Office Web Apps Server 2013 | ||
Microsoft SharePoint Enterprise Server 2016 | ||
Microsoft Word 2013 | ||
Microsoft SharePoint Server Subscription Edition | ||
Microsoft Word 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41061 is a vulnerability in Microsoft Word that allows remote code execution.
CVE-2022-41061 has a severity rating of 7.8, which is considered high.
The affected products include Microsoft 365 Apps for Enterprise, Microsoft Word 2016, Microsoft Office 2019 for Mac, Microsoft Word 2013, SharePoint Enterprise Server 2016, and others. For a complete list, refer to the vendor's security advisory.
To fix CVE-2022-41061, apply the available patches or updates provided by Microsoft. Refer to the vendor's security advisory for specific remediation steps for each affected product.
You can find more information about CVE-2022-41061 on the Microsoft Security Response Center website.