Microsoft Office 远程执行代码漏洞
CVE编号
CVE-2022-21840利用情况
暂无补丁情况
N/A披露时间
2022-01-11漏洞描述
Microsoft Office是美国微软(Microsoft)公司的一款办公软件套件产品。该产品常用组件包括Word、Excel、Access、Powerpoint、FrontPage等。 Microsoft Office存在代码注入漏洞。以下产品和版本受到影响:Microsoft SharePoint Enterprise Server 2016,Microsoft SharePoint Enterprise Server 2013 Service Pack 1,Microsoft SharePoint Server 2019,Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft Office 2019 for Mac,Microsoft Office Online Server,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise for 64-bit Systems,Microsoft Office LTSC for Mac 2021,Microsoft Office LTSC 2021 for 64-bit editions,Microsoft Office LTSC 2021 for 32-bit editions,Microsoft SharePoint Server Subscription Edition,SharePoint Server Subscription Edition Language Pack,Microsoft Excel 2016 (32-bit edition),Microsoft Excel 2016 (64-bit edition),Microsoft Office 2016 (32-bit edition),Microsoft Office 2016 (64-bit edition),Microsoft Excel 2013 RT Service Pack 1,Microsoft Excel 2013 Service Pack 1 (32-bit editions),Microsoft Excel 2013 Service Pack 1 (64-bit editions),Microsoft Office 2013 RT Service Pack 1,Microsoft Office 2013 Service Pack 1 (32-bit editions),Microsoft Office 2013 Service Pack 1 (64-bit editions),Microsoft Office Web Apps Server 2013 Service Pack 1,Microsoft SharePoint Foundation 2013 Service Pack 1解决建议
安装 Windows 最新安全补丁。
参考链接 |
|
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21840 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21840 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | microsoft | excel | 2013 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | excel | 2016 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | 2013 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | 2016 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | 2019 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office | 2021 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office_online_server | - | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | office_web_apps | 2013 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | sharepoint_enterprise_server | 2013 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | sharepoint_server | - | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | sharepoint_server | 2013 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | sharepoint_server | 2016 | - | |||||
运行在以下环境 | |||||||||
应用 | microsoft | sharepoint_server | 2019 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-94 | 对生成代码的控制不恰当(代码注入) |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论