First published: Tue Aug 08 2023(Updated: )
Visual Studio Tools for Office Runtime Spoofing Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2010 Tools for Office Runtime | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft Visual Studio 2019 (includes 16.0 - 16.10) | =16.11 | |
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft Visual Studio 2017 (includes 15.0 - 15.8) | =15.9 | |
Microsoft Visual Studio 2022 | =17.6 | |
Microsoft Visual Studio 2022 | =17.2 | |
Microsoft 365 Apps | ||
Microsoft 365 Apps | ||
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office | =2021 | |
Microsoft Office | =2021 | |
Microsoft Visual Studio 2010 Tools for Office Runtime | ||
Microsoft Visual Studio 2017 | >=15.0<15.9.56 | |
Microsoft Visual Studio 2019 | >=16.0<16.11.29 | |
Microsoft Visual Studio 2022 | >=17.2.0<17.2.18 | |
Microsoft Visual Studio 2022 | >=17.4.0<17.4.10 | |
Microsoft Visual Studio 2022 | >=17.6.0<17.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-36897.
CVE-2023-36897 has a severity rating of 8.1 (high).
The following software products are affected by CVE-2023-36897: Microsoft 365 Apps for Enterprise, Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft Visual Studio 2017, Microsoft Visual Studio 2019, and Microsoft Visual Studio 2022.
To fix CVE-2023-36897, you should apply the relevant security updates provided by Microsoft for the affected software products.
You can find more information about CVE-2023-36897 on the Microsoft Security Response Center (MSRC) website.