Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-16947— Microsoft Outlook Remote Code Execution Vulnerability

CVSS 7.5 · High EPSS 45.39% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-16947

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Outlook Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the targeted user. If the targeted user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Outlook software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>Note that where severity is indicated as Critical in the Affected Products table, the Preview Pane is an attack vector.</p> <p>The security update addresses the vulnerability by correcting how Outlook handles objects in memory.</p>
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Outlook 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook存在缓冲区错误漏洞。该漏洞允许攻击者可以在系统用户的上下文中运行任意代码。以下产品及版本受到影响: Microsoft Outlook 2016版本, Microsoft Office 2019版本, Microsoft 365 Apps版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*
MicrosoftMicrosoft Outlook 2016 16.0.0.0 ~ publication cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:x86:*:*

II. Public POCs for CVE-2020-16947

#POC DescriptionSource LinkShenlong Link
1PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)https://github.com/0neb1n/CVE-2020-16947POC Details
2Outlook 2019 Remote Command Executionhttps://github.com/MasterSploit/CVE-2020-16947POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-16947

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-10-16 · 89 CVEs total

CVE-2020-10808.8 HIGHWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2020-168988.8 HIGHWindows TCP/IP Remote Code Execution Vulnerability
CVE-2020-169118.8 HIGHGDI+ Remote Code Execution Vulnerability
CVE-2020-168918.8 HIGHWindows Hyper-V Remote Code Execution Vulnerability
CVE-2020-169468.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169458.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169448.7 HIGHMicrosoft SharePoint Reflective XSS Vulnerability
CVE-2020-169528.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169518.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169397.8 HIGHGroup Policy Elevation of Privilege Vulnerability
CVE-2020-169367.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-169577.8 HIGHMicrosoft Office Access Connectivity Engine Remote Code Execution Vulnerability
CVE-2020-169357.8 HIGHWindows COM Server Elevation of Privilege Vulnerability
CVE-2020-169307.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169297.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169287.8 HIGHMicrosoft Office Click-to-Run Elevation of Privilege Vulnerability
CVE-2020-169247.8 HIGHJet Database Engine Remote Code Execution Vulnerability
CVE-2020-169317.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169407.8 HIGHWindows - User Profile Service Elevation of Privilege Vulnerability
CVE-2020-169547.8 HIGHMicrosoft Office Remote Code Execution Vulnerability

Showing top 20 of 89 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-16947

No comments yet


Leave a comment