First published: Thu Aug 08 2024(Updated: )
Microsoft Office Spoofing Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office | ||
Microsoft Office | ||
Microsoft Office | ||
Microsoft Office | ||
Microsoft 365 | ||
Microsoft 365 | ||
Microsoft Office | =2016 | |
Microsoft Office | =2016 | |
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Office 2019 for Mac | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2021 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38200 has a critical severity level, allowing for potential spoofing attacks.
To fix CVE-2024-38200, ensure that you install the latest updates from Microsoft for the affected Office products.
CVE-2024-38200 affects multiple versions including Office 2016, Office 2019, Office LTSC 2021, and Microsoft 365 Apps.
Yes, CVE-2024-38200 can potentially impact enterprise operations by allowing attackers to impersonate legitimate users.
If you cannot install the patch for CVE-2024-38200, consider temporarily restricting access to the affected Office applications until a fix is applied.