Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-44695 (GCVE-0-2022-44695)
Vulnerability from cvelistv5
- Remote Code Execution
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Microsoft | Microsoft Office 2019 |
Version: 19.0.0 < https://aka.ms/OfficeSecurityReleases |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:04.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Microsoft Office Visio Remote Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Microsoft Office 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "https://aka.ms/OfficeSecurityReleases", "status": "affected", "version": "19.0.0", "versionType": "custom" } ] }, { "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Microsoft 365 Apps for Enterprise", "vendor": "Microsoft", "versions": [ { "lessThan": "https://aka.ms/OfficeSecurityReleases", "status": "affected", "version": "16.0.1", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems", "32-bit Systems" ], "product": "Microsoft Office LTSC 2021", "vendor": "Microsoft", "versions": [ { "lessThan": "https://aka.ms/OfficeSecurityReleases", "status": "affected", "version": "16.0.1", "versionType": "custom" } ] }, { "platforms": [ "32-bit Systems" ], "product": "Microsoft Visio 2013 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "5511.1000", "status": "affected", "version": "15.0.1", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Microsoft Visio 2013 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "5511.1000", "status": "affected", "version": "15.0.1", "versionType": "custom" } ] }, { "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Microsoft Visio 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "5374.1000", "status": "affected", "version": "16.0.1", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases", "versionStartIncluding": "19.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*", "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases", "versionStartIncluding": "16.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*", "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases", "versionStartIncluding": "16.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio_2013:*:sp1:*:*:*:*:*:*", "versionEndExcluding": "5511.1000", "versionStartIncluding": "15.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio_2013:*:sp1:*:*:*:*:*:*", "versionEndExcluding": "5511.1000", "versionStartIncluding": "15.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "5374.1000", "versionStartIncluding": "16.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2022-12-13T08:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-22T17:49:42.789Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Microsoft Office Visio Remote Code Execution Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" } ], "title": "Microsoft Office Visio Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2022-44695", "datePublished": "2022-12-13T00:00:00", "dateReserved": "2022-11-03T00:00:00", "dateUpdated": "2025-07-22T17:49:42.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-44695\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2022-12-13T19:15:14.213\",\"lastModified\":\"2024-11-21T07:28:20.130\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft Office Visio Remote Code Execution Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Office Visio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*\",\"matchCriteriaId\":\"3259EBFE-AE2D-48B8-BE9A-E22BBDB31378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*\",\"matchCriteriaId\":\"CD25F492-9272-4836-832C-8439EBE64CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"CF5DDD09-902E-4881-98D0-CB896333B4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*\",\"matchCriteriaId\":\"26A3B226-5D7C-4556-9350-5222DC8EFC2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*\",\"matchCriteriaId\":\"1AC0C23F-FC55-4DA1-8527-EB4432038FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*\",\"matchCriteriaId\":\"A719B461-7869-46D0-9300-D0A348DC26A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"87EBA8C7-E317-4EFD-B1AA-DD6A8B0DFDCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89229922-0836-4CC2-AED2-107C3142D0EA\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
wid-sec-w-2022-2305
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Microsoft 365 Apps ist eine Office Suite f\u00fcr zahlreiche B\u00fcroanwendungen.\r\nDie Microsoft Office Suite beinhaltet zahlreiche B\u00fcroanwendungen wie Textverarbeitung, Tabellenkalkulation, Datenbank und weitere Applikationen.\r\nMicrosoft Sharepoint Services ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u.a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Sharepoint Foundation dient der Erstellung von Web Sites auf denen Benutzer an Webseiten, Dokumenten, Listen, Kalendern und Daten zusammenarbeiten k\u00f6nnen. \r\nMicrosoft Sharepoint ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u. a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Visio ist eine Visualisierungs-Software zur Darstellung von Flu\u00dfdiagrammen, Netzpl\u00e4nen oder Organisationsdiagrammen. Microsoft Visio ist eigenst\u00e4ndiger Bestandteil des Microsoft-Office-Systems.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Microsoft Office ausnutzen, um beliebigen Programmcode auszuf\u00fchren und Informationen falsch darzustellen.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2305 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2305.json" }, { "category": "self", "summary": "WID-SEC-2022-2305 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2305" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2022-12-13", "url": "https://msrc.microsoft.com/update-guide" } ], "source_lang": "en-US", "title": "Microsoft Office Mehrere Schwachstellen", "tracking": { "current_release_date": "2022-12-13T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:39:48.126+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-2305", "initial_release_date": "2022-12-13T23:00:00.000+00:00", "revision_history": [ { "date": "2022-12-13T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Microsoft 365 Apps", "product": { "name": "Microsoft 365 Apps", "product_id": "T016910", "product_identification_helper": { "cpe": "cpe:/a:microsoft:365_apps:-" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Office LTSC for Mac 2021", "product": { "name": "Microsoft Office LTSC for Mac 2021", "product_id": "T020985", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office:ltsc_for_mac_2021" } } }, { "category": "product_name", "name": "Microsoft Office LTSC 2021", "product": { "name": "Microsoft Office LTSC 2021", "product_id": "T020986", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office:ltsc_2021" } } } ], "category": "product_name", "name": "Office" }, { "category": "product_name", "name": "Microsoft Office 2019", "product": { "name": "Microsoft Office 2019", "product_id": "T014534", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office_2019:-" } } }, { "category": "product_name", "name": "Microsoft Office 2019 for Mac", "product": { "name": "Microsoft Office 2019 for Mac", "product_id": "T014533", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office_2019_for_mac:-" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft SharePoint Enterprise Server 2016", "product": { "name": "Microsoft SharePoint Enterprise Server 2016", "product_id": "T018556", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint:enterprise_server_2016" } } }, { "category": "product_name", "name": "Microsoft SharePoint Enterprise Server 2013 SP1", "product": { "name": "Microsoft SharePoint Enterprise Server 2013 SP1", "product_id": "T020103", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint:enterprise_server_2013_sp1" } } }, { "category": "product_name", "name": "Microsoft SharePoint Server Subscription Edition", "product": { "name": "Microsoft SharePoint Server Subscription Edition", "product_id": "T021526", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint:server_subscription_edition" } } } ], "category": "product_name", "name": "SharePoint" }, { "category": "product_name", "name": "Microsoft SharePoint Foundation 2013 SP1", "product": { "name": "Microsoft SharePoint Foundation 2013 SP1", "product_id": "T014519", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint_foundation_2013:sp1" } } }, { "category": "product_name", "name": "Microsoft SharePoint Server 2019", "product": { "name": "Microsoft SharePoint Server 2019", "product_id": "T014523", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint_server_2019:-" } } }, { "category": "product_name", "name": "Microsoft Visio 2013 SP1", "product": { "name": "Microsoft Visio 2013 SP1", "product_id": "T016270", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visio_2013:sp1" } } }, { "category": "product_name", "name": "Microsoft Visio 2016", "product": { "name": "Microsoft Visio 2016", "product_id": "T016271", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visio_2016:-" } } } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-47213", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-47213" }, { "cve": "CVE-2022-47212", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-47212" }, { "cve": "CVE-2022-47211", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-47211" }, { "cve": "CVE-2022-44713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44713" }, { "cve": "CVE-2022-44696", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44696" }, { "cve": "CVE-2022-44695", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44695" }, { "cve": "CVE-2022-44694", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44694" }, { "cve": "CVE-2022-44693", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44693" }, { "cve": "CVE-2022-44692", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44692" }, { "cve": "CVE-2022-44691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44691" }, { "cve": "CVE-2022-44690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44690" }, { "cve": "CVE-2022-26806", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-26806" }, { "cve": "CVE-2022-26805", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-26805" }, { "cve": "CVE-2022-26804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-26804" } ] }
WID-SEC-W-2022-2305
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Microsoft 365 Apps ist eine Office Suite f\u00fcr zahlreiche B\u00fcroanwendungen.\r\nDie Microsoft Office Suite beinhaltet zahlreiche B\u00fcroanwendungen wie Textverarbeitung, Tabellenkalkulation, Datenbank und weitere Applikationen.\r\nMicrosoft Sharepoint Services ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u.a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Sharepoint Foundation dient der Erstellung von Web Sites auf denen Benutzer an Webseiten, Dokumenten, Listen, Kalendern und Daten zusammenarbeiten k\u00f6nnen. \r\nMicrosoft Sharepoint ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u. a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Visio ist eine Visualisierungs-Software zur Darstellung von Flu\u00dfdiagrammen, Netzpl\u00e4nen oder Organisationsdiagrammen. Microsoft Visio ist eigenst\u00e4ndiger Bestandteil des Microsoft-Office-Systems.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Microsoft Office ausnutzen, um beliebigen Programmcode auszuf\u00fchren und Informationen falsch darzustellen.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2305 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2305.json" }, { "category": "self", "summary": "WID-SEC-2022-2305 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2305" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2022-12-13", "url": "https://msrc.microsoft.com/update-guide" } ], "source_lang": "en-US", "title": "Microsoft Office Mehrere Schwachstellen", "tracking": { "current_release_date": "2022-12-13T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:39:48.126+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-2305", "initial_release_date": "2022-12-13T23:00:00.000+00:00", "revision_history": [ { "date": "2022-12-13T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Microsoft 365 Apps", "product": { "name": "Microsoft 365 Apps", "product_id": "T016910", "product_identification_helper": { "cpe": "cpe:/a:microsoft:365_apps:-" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Office LTSC for Mac 2021", "product": { "name": "Microsoft Office LTSC for Mac 2021", "product_id": "T020985", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office:ltsc_for_mac_2021" } } }, { "category": "product_name", "name": "Microsoft Office LTSC 2021", "product": { "name": "Microsoft Office LTSC 2021", "product_id": "T020986", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office:ltsc_2021" } } } ], "category": "product_name", "name": "Office" }, { "category": "product_name", "name": "Microsoft Office 2019", "product": { "name": "Microsoft Office 2019", "product_id": "T014534", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office_2019:-" } } }, { "category": "product_name", "name": "Microsoft Office 2019 for Mac", "product": { "name": "Microsoft Office 2019 for Mac", "product_id": "T014533", "product_identification_helper": { "cpe": "cpe:/a:microsoft:office_2019_for_mac:-" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft SharePoint Enterprise Server 2016", "product": { "name": "Microsoft SharePoint Enterprise Server 2016", "product_id": "T018556", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint:enterprise_server_2016" } } }, { "category": "product_name", "name": "Microsoft SharePoint Enterprise Server 2013 SP1", "product": { "name": "Microsoft SharePoint Enterprise Server 2013 SP1", "product_id": "T020103", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint:enterprise_server_2013_sp1" } } }, { "category": "product_name", "name": "Microsoft SharePoint Server Subscription Edition", "product": { "name": "Microsoft SharePoint Server Subscription Edition", "product_id": "T021526", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint:server_subscription_edition" } } } ], "category": "product_name", "name": "SharePoint" }, { "category": "product_name", "name": "Microsoft SharePoint Foundation 2013 SP1", "product": { "name": "Microsoft SharePoint Foundation 2013 SP1", "product_id": "T014519", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint_foundation_2013:sp1" } } }, { "category": "product_name", "name": "Microsoft SharePoint Server 2019", "product": { "name": "Microsoft SharePoint Server 2019", "product_id": "T014523", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sharepoint_server_2019:-" } } }, { "category": "product_name", "name": "Microsoft Visio 2013 SP1", "product": { "name": "Microsoft Visio 2013 SP1", "product_id": "T016270", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visio_2013:sp1" } } }, { "category": "product_name", "name": "Microsoft Visio 2016", "product": { "name": "Microsoft Visio 2016", "product_id": "T016271", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visio_2016:-" } } } ], "category": "vendor", "name": "Microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-47213", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-47213" }, { "cve": "CVE-2022-47212", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-47212" }, { "cve": "CVE-2022-47211", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-47211" }, { "cve": "CVE-2022-44713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44713" }, { "cve": "CVE-2022-44696", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44696" }, { "cve": "CVE-2022-44695", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44695" }, { "cve": "CVE-2022-44694", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44694" }, { "cve": "CVE-2022-44693", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44693" }, { "cve": "CVE-2022-44692", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44692" }, { "cve": "CVE-2022-44691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44691" }, { "cve": "CVE-2022-44690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-44690" }, { "cve": "CVE-2022-26806", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-26806" }, { "cve": "CVE-2022-26805", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-26805" }, { "cve": "CVE-2022-26804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Office Produkten. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T014519", "T020103", "T018556", "T016271", "T016270", "T021526", "T020986", "T020985", "T014533", "T016910", "T014523", "T014534" ] }, "release_date": "2022-12-13T23:00:00.000+00:00", "title": "CVE-2022-26804" } ] }
CERTFR-2022-AVI-1102
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft Office. Elles permettent à un attaquant de provoquer une usurpation d'identité, une exécution de code à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Microsoft | Office | Microsoft Office LTSC 2021 pour éditions 64 bits | ||
Microsoft | Office | Microsoft SharePoint Foundation 2013 Service Pack 1 | ||
Microsoft | Office | Microsoft Office LTSC 2021 pour éditions 32 bits | ||
Microsoft | Office | Microsoft Office 2019 pour éditions 32 bits | ||
Microsoft | Office | Microsoft Office 2019 pour Mac | ||
Microsoft | Office | Microsoft Office 2019 pour éditions 64 bits | ||
Microsoft | Office | Microsoft Office LTSC pour Mac 2021 | ||
Microsoft | Office | Microsoft Outlook pour Android | ||
Microsoft | Office | Microsoft SharePoint Server Subscription Edition | ||
Microsoft | Office | Microsoft SharePoint Enterprise Server 2016 | ||
Microsoft | Office | Microsoft SharePoint Server 2019 | ||
Microsoft | Office | Microsoft SharePoint Enterprise Server 2013 Service Pack 1 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Microsoft Office LTSC 2021 pour \u00e9ditions 64 bits", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft SharePoint Foundation 2013 Service Pack 1", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Office LTSC 2021 pour \u00e9ditions 32 bits", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Office 2019 pour \u00e9ditions 32 bits", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Office 2019 pour Mac", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Office 2019 pour \u00e9ditions 64 bits", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Office LTSC pour Mac 2021", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Outlook pour Android", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft SharePoint Server Subscription Edition", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft SharePoint Enterprise Server 2016", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft SharePoint Server 2019", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft SharePoint Enterprise Server 2013 Service Pack 1", "product": { "name": "Office", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-44696", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44696" }, { "name": "CVE-2022-24480", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24480" }, { "name": "CVE-2022-44693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44693" }, { "name": "CVE-2022-44690", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44690" }, { "name": "CVE-2022-44713", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44713" }, { "name": "CVE-2022-44691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44691" }, { "name": "CVE-2022-44694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44694" }, { "name": "CVE-2022-44695", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44695" }, { "name": "CVE-2022-44692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44692" } ], "initial_release_date": "2022-12-14T00:00:00", "last_revision_date": "2022-12-14T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44694 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44694" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44690 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44690" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44693 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44693" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-24480 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24480" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44692 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44692" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44696 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44696" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44713 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44713" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44695 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44691 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44691" } ], "reference": "CERTFR-2022-AVI-1102", "revisions": [ { "description": "Version initiale", "revision_date": "2022-12-14T00:00:00.000000" } ], "risks": [ { "description": "Usurpation d\u0027identit\u00e9" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Office\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une usurpation d\u0027identit\u00e9, une ex\u00e9cution de code \u00e0 distance\net une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Office", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/" } ] }
CERTFR-2022-AVI-1106
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer une exécution de code à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Microsoft | N/A | Microsoft Dynamics NAV 2018 | ||
Microsoft | N/A | Microsoft Visual Studio 2022 version 17.0 | ||
Microsoft | N/A | Dynamics 365 Business Central 2019 Release Wave 2 (On-Premise) | ||
Microsoft | N/A | PowerShell 7.2 | ||
Microsoft | N/A | Microsoft Dynamics 365 Business Central 2022 Release Wave 2 | ||
Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
Microsoft | N/A | Microsoft Visio 2013 Service Pack 1 (éditions 32 bits) | ||
Microsoft | N/A | Microsoft Dynamics 365 Business Central 2022 Release Wave 1 | ||
Microsoft | N/A | Microsoft Dynamics NAV 2017 | ||
Microsoft | N/A | Raw Image Extension | ||
Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
Microsoft | N/A | Microsoft Visio 2016 (édition 64 bits) | ||
Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
Microsoft | N/A | Microsoft Dynamics 365 Business Central 2020 Release Wave 2 | ||
Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
Microsoft | N/A | Microsoft Visio 2016 (édition 32 bits) | ||
Microsoft | N/A | Microsoft Dynamics NAV 2016 | ||
Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
Microsoft | N/A | Dynamics 365 Business Central Spring 2019 Update | ||
Microsoft | N/A | Microsoft Dynamics 365 Business Central 2020 Release Wave 1 | ||
Microsoft | N/A | Microsoft Visio 2013 Service Pack 1 (éditions 64 bits) | ||
Microsoft | N/A | Microsoft Dynamics 365 Business Central 2021 Release Wave 1 | ||
Microsoft | N/A | Microsoft Dynamics 365 Business Central 2021 Release Wave 2 | ||
Microsoft | N/A | PowerShell 7.3 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Microsoft Dynamics NAV 2018", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visual Studio 2022 version 17.0", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Dynamics 365 Business Central 2019 Release Wave 2 (On-Premise)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "PowerShell 7.2", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics 365 Business Central 2022 Release Wave 2", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visual Studio 2022 version 17.2", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visio 2013 Service Pack 1 (\u00e9ditions 32 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics 365 Business Central 2022 Release Wave 1", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics NAV 2017", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Raw Image Extension", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visio 2016 (\u00e9dition 64 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics 365 Business Central 2020 Release Wave 2", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visio 2016 (\u00e9dition 32 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics NAV 2016", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visual Studio 2022 version 17.4", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Dynamics 365 Business Central Spring 2019 Update", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics 365 Business Central 2020 Release Wave 1", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Visio 2013 Service Pack 1 (\u00e9ditions 64 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics 365 Business Central 2021 Release Wave 1", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Dynamics 365 Business Central 2021 Release Wave 2", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "PowerShell 7.3", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-44696", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44696" }, { "name": "CVE-2022-47211", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47211" }, { "name": "CVE-2022-41076", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41076" }, { "name": "CVE-2022-47212", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47212" }, { "name": "CVE-2022-44691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44691" }, { "name": "CVE-2022-44694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44694" }, { "name": "CVE-2022-44695", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44695" }, { "name": "CVE-2022-44687", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44687" }, { "name": "CVE-2022-41127", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41127" }, { "name": "CVE-2022-26805", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26805" }, { "name": "CVE-2022-26804", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26804" }, { "name": "CVE-2022-47213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47213" }, { "name": "CVE-2022-44692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44692" }, { "name": "CVE-2022-26806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26806" }, { "name": "CVE-2022-41089", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41089" } ], "initial_release_date": "2022-12-14T00:00:00", "last_revision_date": "2022-12-14T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44694 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44694" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41127 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41127" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-47212 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-47212" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41076 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41076" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26806 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26806" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44692 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44692" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44696 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44696" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-47211 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-47211" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26805 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26805" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44687 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44687" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-47213 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-47213" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41089 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41089" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44695 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-26804 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26804" }, { "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-44691 du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44691" } ], "reference": "CERTFR-2022-AVI-1106", "revisions": [ { "description": "Version initiale", "revision_date": "2022-12-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 d\u00e9cembre 2022", "url": "https://msrc.microsoft.com/update-guide/" } ] }
ghsa-5r4q-cxm9-j4ww
Vulnerability from github
Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44694, CVE-2022-44696.
{ "affected": [], "aliases": [ "CVE-2022-44695" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-12-13T19:15:00Z", "severity": "HIGH" }, "details": "Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44694, CVE-2022-44696.", "id": "GHSA-5r4q-cxm9-j4ww", "modified": "2022-12-13T21:30:27Z", "published": "2022-12-13T21:30:27Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44695" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-44695" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
msrc_cve-2022-44695
Vulnerability from csaf_microsoft
Notes
{ "document": { "acknowledgments": [ { "names": [ "Mat Powell of \u003ca href=\"https://www.zerodayinitiative.com/\"\u003eTrend Micro Zero Day Initiative\u003c/a\u003e" ] } ], "aggregate_severity": { "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Public", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.", "title": "Disclaimer" }, { "category": "general", "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.", "title": "Customer Action" } ], "publisher": { "category": "vendor", "contact_details": "secure@microsoft.com", "name": "Microsoft Security Response Center", "namespace": "https://msrc.microsoft.com" }, "references": [ { "category": "self", "summary": "CVE-2022-44695 Microsoft Office Visio Remote Code Execution Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" }, { "category": "self", "summary": "CVE-2022-44695 Microsoft Office Visio Remote Code Execution Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/advisories/2022/msrc_cve-2022-44695.json" }, { "category": "external", "summary": "Microsoft Exploitability Index", "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1" }, { "category": "external", "summary": "Microsoft Support Lifecycle", "url": "https://support.microsoft.com/lifecycle" }, { "category": "external", "summary": "Common Vulnerability Scoring System", "url": "https://www.first.org/cvss" } ], "title": "Microsoft Office Visio Remote Code Execution Vulnerability", "tracking": { "current_release_date": "2022-12-13T08:00:00.000Z", "generator": { "date": "2025-07-22T17:49:26.531Z", "engine": { "name": "MSRC Generator", "version": "1.0" } }, "id": "msrc_CVE-2022-44695", "initial_release_date": "2022-12-13T08:00:00.000Z", "revision_history": [ { "date": "2022-12-13T08:00:00.000Z", "legacy_version": "1", "number": "1", "summary": "Information published." } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003chttps://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office 2019 for 32-bit editions \u003chttps://aka.ms/OfficeSecurityReleases", "product_id": "6" } }, { "category": "product_version", "name": "https://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office 2019 for 32-bit editions https://aka.ms/OfficeSecurityReleases", "product_id": "11573" } } ], "category": "product_name", "name": "Microsoft Office 2019 for 32-bit editions" }, { "branches": [ { "category": "product_version_range", "name": "\u003chttps://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office 2019 for 64-bit editions \u003chttps://aka.ms/OfficeSecurityReleases", "product_id": "5" } }, { "category": "product_version", "name": "https://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office 2019 for 64-bit editions https://aka.ms/OfficeSecurityReleases", "product_id": "11574" } } ], "category": "product_name", "name": "Microsoft Office 2019 for 64-bit editions" }, { "branches": [ { "category": "product_version_range", "name": "\u003chttps://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft 365 Apps for Enterprise for 32-bit Systems \u003chttps://aka.ms/OfficeSecurityReleases", "product_id": "4" } }, { "category": "product_version", "name": "https://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft 365 Apps for Enterprise for 32-bit Systems https://aka.ms/OfficeSecurityReleases", "product_id": "11762" } } ], "category": "product_name", "name": "Microsoft 365 Apps for Enterprise for 32-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003chttps://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft 365 Apps for Enterprise for 64-bit Systems \u003chttps://aka.ms/OfficeSecurityReleases", "product_id": "3" } }, { "category": "product_version", "name": "https://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft 365 Apps for Enterprise for 64-bit Systems https://aka.ms/OfficeSecurityReleases", "product_id": "11763" } } ], "category": "product_name", "name": "Microsoft 365 Apps for Enterprise for 64-bit Systems" }, { "branches": [ { "category": "product_version_range", "name": "\u003chttps://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office LTSC 2021 for 64-bit editions \u003chttps://aka.ms/OfficeSecurityReleases", "product_id": "2" } }, { "category": "product_version", "name": "https://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office LTSC 2021 for 64-bit editions https://aka.ms/OfficeSecurityReleases", "product_id": "11952" } } ], "category": "product_name", "name": "Microsoft Office LTSC 2021 for 64-bit editions" }, { "branches": [ { "category": "product_version_range", "name": "\u003chttps://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office LTSC 2021 for 32-bit editions \u003chttps://aka.ms/OfficeSecurityReleases", "product_id": "1" } }, { "category": "product_version", "name": "https://aka.ms/OfficeSecurityReleases", "product": { "name": "Microsoft Office LTSC 2021 for 32-bit editions https://aka.ms/OfficeSecurityReleases", "product_id": "11953" } } ], "category": "product_name", "name": "Microsoft Office LTSC 2021 for 32-bit editions" }, { "branches": [ { "category": "product_version_range", "name": "\u003c5511.1000", "product": { "name": "Microsoft Visio 2013 Service Pack 1 (32-bit editions) \u003c5511.1000", "product_id": "10" } }, { "category": "product_version", "name": "5511.1000", "product": { "name": "Microsoft Visio 2013 Service Pack 1 (32-bit editions) 5511.1000", "product_id": "10725" } } ], "category": "product_name", "name": "Microsoft Visio 2013 Service Pack 1 (32-bit editions)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c5511.1000", "product": { "name": "Microsoft Visio 2013 Service Pack 1 (64-bit editions) \u003c5511.1000", "product_id": "9" } }, { "category": "product_version", "name": "5511.1000", "product": { "name": "Microsoft Visio 2013 Service Pack 1 (64-bit editions) 5511.1000", "product_id": "10726" } } ], "category": "product_name", "name": "Microsoft Visio 2013 Service Pack 1 (64-bit editions)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c5374.1000", "product": { "name": "Microsoft Visio 2016 (32-bit edition) \u003c5374.1000", "product_id": "8" } }, { "category": "product_version", "name": "5374.1000", "product": { "name": "Microsoft Visio 2016 (32-bit edition) 5374.1000", "product_id": "10743" } } ], "category": "product_name", "name": "Microsoft Visio 2016 (32-bit edition)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c5374.1000", "product": { "name": "Microsoft Visio 2016 (64-bit edition) \u003c5374.1000", "product_id": "7" } }, { "category": "product_version", "name": "5374.1000", "product": { "name": "Microsoft Visio 2016 (64-bit edition) 5374.1000", "product_id": "10744" } } ], "category": "product_name", "name": "Microsoft Visio 2016 (64-bit edition)" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-44695", "notes": [ { "category": "general", "text": "Microsoft", "title": "Assigning CNA" }, { "category": "faq", "text": "The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.\nThe vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability.", "title": "According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?" }, { "category": "faq", "text": "A user would need to be tricked into opening a malicious file in Visio.", "title": "According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?" } ], "product_status": { "fixed": [ "10725", "10726", "10743", "10744", "11573", "11574", "11762", "11763", "11952", "11953" ], "known_affected": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10" ] }, "references": [ { "category": "self", "summary": "CVE-2022-44695 Microsoft Office Visio Remote Code Execution Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" }, { "category": "self", "summary": "CVE-2022-44695 Microsoft Office Visio Remote Code Execution Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/advisories/2022/msrc_cve-2022-44695.json" } ], "remediations": [ { "category": "vendor_fix", "date": "2022-12-13T08:00:00.000Z", "details": "https://aka.ms/OfficeSecurityReleases:Security Update:https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates", "product_ids": [ "6", "5", "4", "3", "2", "1" ], "url": "https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates" }, { "category": "vendor_fix", "date": "2022-12-13T08:00:00.000Z", "details": "5511.1000:Security Update:https://support.microsoft.com/help/5002280", "product_ids": [ "10", "9" ], "url": "https://support.microsoft.com/help/5002280" }, { "category": "vendor_fix", "date": "2022-12-13T08:00:00.000Z", "details": "5374.1000:Security Update:https://support.microsoft.com/help/5002286", "product_ids": [ "8", "7" ], "url": "https://support.microsoft.com/help/5002286" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalsScore": 0.0, "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 6.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "6", "7", "8", "9", "10" ] } ], "threats": [ { "category": "impact", "details": "Remote Code Execution" }, { "category": "exploit_status", "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely" } ], "title": "Microsoft Office Visio Remote Code Execution Vulnerability" } ] }
cnvd-2022-89422
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-44695
Name | ['Microsoft Visio 2013 SP1', 'Microsoft Visio 2016', 'Microsoft Office 2019', 'Microsoft 365 Apps for Enterprise', 'Microsoft Office 2021'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-44695", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-44695" } }, "description": "Microsoft Office\u662f\u5fae\u8f6f\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u5957\u57fa\u4e8eWindows\u64cd\u4f5c\u7cfb\u7edf\u7684\u529e\u516c\u8f6f\u4ef6\u5957\u88c5\u3002\n\nMicrosoft Office Visio\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u4e3b\u673a\u4e0a\u6267\u884c\u4ee3\u7801\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-44695", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-89422", "openTime": "2022-12-22", "patchDescription": "Microsoft Office\u662f\u5fae\u8f6f\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u5957\u57fa\u4e8eWindows\u64cd\u4f5c\u7cfb\u7edf\u7684\u529e\u516c\u8f6f\u4ef6\u5957\u88c5\u3002\r\n\r\nMicrosoft Office Visio\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u4e3b\u673a\u4e0a\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Microsoft Office Visio\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2022-89422\uff09\u7684\u8865\u4e01", "products": { "product": [ "Microsoft Visio 2013 SP1", "Microsoft Visio 2016", "Microsoft Office 2019", "Microsoft 365 Apps for Enterprise", "Microsoft Office 2021" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-44695", "serverity": "\u9ad8", "submitTime": "2022-12-19", "title": "Microsoft Office Visio\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2022-89422\uff09" }
fkie_cve-2022-44695
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", "matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", "matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*", "matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*", "matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*", "matchCriteriaId": "1AC0C23F-FC55-4DA1-8527-EB4432038FB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*", "matchCriteriaId": "A719B461-7869-46D0-9300-D0A348DC26A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "87EBA8C7-E317-4EFD-B1AA-DD6A8B0DFDCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*", "matchCriteriaId": "89229922-0836-4CC2-AED2-107C3142D0EA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Office Visio" } ], "id": "CVE-2022-44695", "lastModified": "2024-11-21T07:28:20.130", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Primary" } ] }, "published": "2022-12-13T19:15:14.213", "references": [ { "source": "secure@microsoft.com", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2022-44695
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-44695", "description": "Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44694, CVE-2022-44696.", "id": "GSD-2022-44695" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-44695" ], "details": "Microsoft Office Visio Remote Code Execution Vulnerability", "id": "GSD-2022-44695", "modified": "2023-12-13T01:19:25.529582Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-44695", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Microsoft Office 2019", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "19.0.0", "version_value": "https://aka.ms/OfficeSecurityReleases" } ] } }, { "product_name": "Microsoft 365 Apps for Enterprise", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "16.0.1", "version_value": "https://aka.ms/OfficeSecurityReleases" } ] } }, { "product_name": "Microsoft Office LTSC 2021", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "16.0.1", "version_value": "https://aka.ms/OfficeSecurityReleases" } ] } }, { "product_name": "Microsoft Visio 2013 Service Pack 1", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "15.0.1", "version_value": "5511.1000" } ] } }, { "product_name": "Microsoft Visio 2013 Service Pack 1 ", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "15.0.1", "version_value": "5511.1000" } ] } }, { "product_name": "Microsoft Visio 2016", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "16.0.1", "version_value": "5374.1000" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" } ] }, "impact": { "cvss": [ { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695", "refsource": "MISC", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2022-44695" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695", "refsource": "MISC", "tags": [], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44695" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-03-10T19:15Z", "publishedDate": "2022-12-13T19:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.