Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21716— Microsoft Word Remote Code Execution Vulnerability

CVSS 9.8 · Critical EPSS 91.42% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-21716

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Word Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft Word Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
整数溢出或超界折返
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Word 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Word是美国微软(Microsoft)公司的一套Office套件中的文字处理软件。 Microsoft Office Word存在安全漏洞。以下产品和版本受到影响:Microsoft Office Online Server,Microsoft Office 2019 for Mac,Microsoft 365 Apps for Enterprise for 64-bit Systems,Microsoft SharePoint Enterprise Server 2016,Micr
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft Office LTSC for Mac 2021 16.0.1 ~ 16.70.23021201 -
MicrosoftMicrosoft Office LTSC 2021 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft SharePoint Server Subscription Edition 16.0.0 ~ 16.0.15601.20478 -
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftSharePoint Server Subscription Edition Language Pack 16.0.0 ~ 16.0.15601.20478 -
MicrosoftMicrosoft Office Online Server 16.0.1 ~ 16.0.10395.20001 -
MicrosoftMicrosoft Office 2019 for Mac 16.0.0 ~ 16.70.23021201 -
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft SharePoint Enterprise Server 2016 16.0.0 ~ 16.0.5383.1000 -
MicrosoftMicrosoft SharePoint Enterprise Server 2013 Service Pack 1 15.0.0 ~ 15.0.5529.1000 -
MicrosoftMicrosoft SharePoint Server 2019 16.0.0 ~ 16.0.10395.20001 -
MicrosoftMicrosoft Word 2016 16.0.1 ~ 16.0.5383.1000 -
MicrosoftMicrosoft Office Web Apps Server 2013 Service Pack 1 15.0.1 ~ 15.0.5529.1000 -
MicrosoftMicrosoft SharePoint Foundation 2013 Service Pack 1 15.0.0 ~ 15.0.5529.1000 -
MicrosoftMicrosoft Word 2013 Service Pack 1 15.0.1 ~ 15.0.5529.1000 -
MicrosoftMicrosoft Word 2013 Service Pack 1 15.0.1 ~ 15.0.5529.1000 -

II. Public POCs for CVE-2023-21716

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/FeatherStark/CVE-2023-21716POC Details
2RTF Crash POC Python 3.11 Windows 10https://github.com/Xnuvers007/CVE-2023-21716POC Details
3A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).https://github.com/gyaansastra/CVE-2023-21716POC Details
4Results of retrohunt for files matching YARA rules from https://github.com/AmgdGocha/Detection-Rules/blob/main/CVE-2023-21716.yarhttps://github.com/mikesxrs/CVE-2023-21716_YARA_ResultsPOC Details
5Microsoft Word 远程代码执行漏洞https://github.com/CKevens/CVE-2023-21716-POCPOC Details
6test of exploit for CVE-2023-21716https://github.com/hv0l/CVE-2023-21716_exploitPOC Details
7POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruptionhttps://github.com/JMousqueton/CVE-2023-21716POC Details
8python program to exploit CVE-2023-21716https://github.com/Lord-of-the-IoT/CVE-2023-21716POC Details
9This is an exploit file which is used to check CVE-2021-21716 vulnerabilityhttps://github.com/MojithaR/CVE-2023-21716-EXPLOIT.pyPOC Details
10Microsoft Word 远程代码执行漏洞https://github.com/3yujw7njai/CVE-2023-21716-POCPOC Details
11POC CVE 2023-21716https://github.com/n0s3ns33/poc-cve-2023-21716POC Details
12Proof Of Concept for CVE-2023-21716 Microsoft Word Heap Corruptionhttps://github.com/RonF98/CVE-2023-21716-POCPOC Details
13Microsoft Word 远程代码执行漏洞https://github.com/AiK1d/CVE-2023-21716-POCPOC Details
14Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Microsoft%20Word%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-21716.mdPOC Details
15Microsoft Word 远程代码执行漏洞https://github.com/P4x1s/CVE-2023-21716-POCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-21716

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2023-02-14 · 78 CVEs total

CVE-2023-216899.8 CRITICALMicrosoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner
CVE-2023-216909.8 CRITICALMicrosoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner
CVE-2023-216929.8 CRITICALMicrosoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner
CVE-2023-218039.8 CRITICALWindows iSCSI Discovery Service Remote Code Execution Vulnerability
CVE-2023-216858.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-216848.8 HIGHMicrosoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-217068.8 HIGHMicrosoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-217058.8 HIGHMicrosoft SQL Server Remote Code Execution Vulnerability
CVE-2023-217078.8 HIGHMicrosoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-217178.8 HIGHMicrosoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2023-215298.8 HIGHMicrosoft Exchange Server Remote Code Execution Vulnerability
CVE-2023-217138.8 HIGHMicrosoft SQL Server Remote Code Execution Vulnerability
CVE-2023-217988.8 HIGHMicrosoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-217998.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-216868.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-217978.8 HIGHMicrosoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-217778.7 HIGHAzure App Service on Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2023-233748.3 HIGHMicrosoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2023-218068.2 HIGHPower BI Report Server Spoofing Vulnerability
CVE-2023-217788.0 HIGHMicrosoft Dynamics Unified Service Desk Remote Code Execution Vulnerability

Showing top 20 of 78 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-21716

No comments yet


Leave a comment