First published: Tue Jul 11 2023(Updated: )
Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents. An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. Please see the Microsoft Threat Intelligence Blog https://aka.ms/Storm-0978 Entry for important information about steps you can take to protect your system from this vulnerability. This CVE will be updated with new information and links to security updates when they become available.
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Word 2016 | ||
Microsoft Word 2016 | ||
Microsoft Word 2013 | ||
Microsoft Word 2013 | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2012 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office | =2021 | |
Microsoft Office | =2021 | |
Microsoft Word | =2013-sp1 | |
Microsoft Word | =2016 | |
Microsoft Windows 10 1507 | ||
Microsoft Windows 10 1507 | ||
Microsoft Windows 10 1607 | ||
Microsoft Windows 10 1607 | ||
Microsoft Windows 10 1809 | ||
Microsoft Windows 10 1809 | ||
Microsoft Windows 10 1809 | ||
Microsoft Windows 10 21h2 | ||
Microsoft Windows 10 21h2 | ||
Microsoft Windows 10 21h2 | ||
Microsoft Windows 10 22h2 | ||
Microsoft Windows 10 22h2 | ||
Microsoft Windows 10 22h2 | ||
Microsoft Windows 11 | =22h2 | |
Microsoft Windows 11 | =22h2 | |
Microsoft Windows 11 21h2 | ||
Microsoft Windows 11 21h2 | ||
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Server 2008 | =r2-sp1 | |
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2012 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 | ||
Microsoft Windows Server 2008 | ||
Microsoft Windows 10 1507 | <10.0.10240.20107 | |
Microsoft Windows 10 1607 | <10.0.14393.6167 | |
Microsoft Windows 10 1809 | <10.0.17763.4737 | |
Microsoft Windows 10 21h2 | <10.0.19044.3324 | |
Microsoft Windows 10 22h2 | <10.0.19044.3324 | |
Microsoft Windows 11 21h2 | <10.0.22000.2295 | |
Microsoft Windows 11 22h2 | <10.0.22621.2134 | |
Microsoft Windows Server 2016 | <10.0.14393.6167 | |
Microsoft Windows Server 2016 | =10.0.14393.6614 | |
Microsoft Windows Server 2019 | <10.0.17763.4737 | |
Microsoft Windows Server 2022 | <10.0.20348.1903 | |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.