First published: Tue Aug 13 2024(Updated: )
Microsoft PowerPoint Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft 365 Apps for Enterprise | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft PowerPoint 2016 | ||
Microsoft PowerPoint 2016 | ||
microsoft 365 apps | ||
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Office Long Term Servicing Channel for Mac | =2021 | |
Microsoft PowerPoint | =2016 | |
Microsoft Office Long Term Servicing Channel for Mac |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38171 has been classified with a high severity level due to its potential for remote code execution.
To fix CVE-2024-38171, you should apply the security updates provided by Microsoft for the affected versions of PowerPoint and Office.
CVE-2024-38171 affects multiple Microsoft products, including Microsoft 365 Apps for Enterprise, Office 2019, and PowerPoint 2016.
Yes, CVE-2024-38171 can lead to data compromise as it allows an attacker to execute arbitrary code on the affected system.
Currently, the recommended approach for CVE-2024-38171 is to apply the latest security updates from Microsoft, as no official workaround is suggested.