First published: Tue Aug 08 2023(Updated: )
Microsoft Outlook Remote Code Execution Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office 2013 | ||
Microsoft Office 2013 | ||
Microsoft Office 2013 RT | ||
Microsoft Word 2013 | ||
Microsoft Word 2013 | ||
Microsoft Word 2013 RT | ||
Microsoft Office LTSC for Mac 2021 | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft 365 Apps | ||
Microsoft 365 Apps | ||
Microsoft Office | =2013-sp1 | |
Microsoft Office | =2013_rt-sp1 | |
Microsoft Office | =2016 | |
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Office Long Term Servicing Channel Macos | =2021 | |
Microsoft Word 2013 | ||
Microsoft Word 2013 | ||
Microsoft Office 2016 | ||
Microsoft Office 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-36895 is critical with a severity value of 7.8.
Microsoft Office 2013, Microsoft Office 2016, Microsoft Office LTSC for Mac 2021, Microsoft Office 2019 for Mac, Microsoft Office LTSC 2021, Microsoft 365 Apps for Enterprise are affected by CVE-2023-36895.
You can fix the CVE-2023-36895 vulnerability by applying the available patches or updates provided by Microsoft for the affected software versions.
The patches or updates for CVE-2023-36895 can be found on the official Microsoft support website or through the provided download links.
More information about CVE-2023-36895 can be found on the Microsoft Security Response Center website.