Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-16933— Microsoft Word Security Feature Bypass Vulnerability

CVSS 7.0 · High EPSS 4.40% · P89
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-16933

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Word Security Feature Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
<p>A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.</p> <p>To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Word handles these files.</p>
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Word 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Word是美国微软(Microsoft)公司的一套Office套件中的文字处理软件。 Microsoft Word 存在安全漏洞,该漏洞源于软件无法正确处理 .LNK 文件时,该软件中存在安全功能绕过漏洞。攻击者可利用该漏洞使用经特殊设计的文件在当前用户的安全上下文中执行操作。以下产品及版本受到影响: Microsoft Word 2013 SP1版本, Microsoft Office 2016版本, Microsoft Word 2010 SP2版本, Microsoft Offi
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*
MicrosoftMicrosoft Office 2019 for Mac 16.0.0 ~ publication cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*
MicrosoftMicrosoft Word 2016 16.0.1 ~ publication cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*
MicrosoftMicrosoft Office 2016 for Mac 16.0.0 ~ publication cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*
MicrosoftMicrosoft Word 2010 Service Pack 2 13.0.0.0 ~ publication cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*
MicrosoftMicrosoft Word 2013 Service Pack 1 15.0.1 ~ publication cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*
MicrosoftMicrosoft Word 2013 Service Pack 1 15.0.1 ~ publication cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*

II. Public POCs for CVE-2020-16933

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-16933

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-10-16 · 89 CVEs total

CVE-2020-10808.8 HIGHWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2020-168988.8 HIGHWindows TCP/IP Remote Code Execution Vulnerability
CVE-2020-169118.8 HIGHGDI+ Remote Code Execution Vulnerability
CVE-2020-168918.8 HIGHWindows Hyper-V Remote Code Execution Vulnerability
CVE-2020-169468.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169458.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169448.7 HIGHMicrosoft SharePoint Reflective XSS Vulnerability
CVE-2020-169528.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169518.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169397.8 HIGHGroup Policy Elevation of Privilege Vulnerability
CVE-2020-169547.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2020-169367.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-169357.8 HIGHWindows COM Server Elevation of Privilege Vulnerability
CVE-2020-169297.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169287.8 HIGHMicrosoft Office Click-to-Run Elevation of Privilege Vulnerability
CVE-2020-169247.8 HIGHJet Database Engine Remote Code Execution Vulnerability
CVE-2020-169237.8 HIGHMicrosoft Graphics Components Remote Code Execution Vulnerability
CVE-2020-169307.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169407.8 HIGHWindows - User Profile Service Elevation of Privilege Vulnerability
CVE-2020-169577.8 HIGHMicrosoft Office Access Connectivity Engine Remote Code Execution Vulnerability

Showing top 20 of 89 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-16933

No comments yet


Leave a comment