MS.Office.RTF.File.OLE.autolink.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Office and WordPad.
The vulnerability is due to improper handling of objects while the vulnerable software attempts to access a specially crafted RTF file. An attacker can exploit this to execute arbitrary code within the context of the logged in user via a crafted RTF file.

description-logoOutbreak Alert

Microsoft has identified a phishing campaign conducted by the threat actor tracked as Storm-0978 targeting defense and government entities in Europe and North America. The campaign involved the abuse of CVE-2023-36884, a remote code execution vulnerability exploited via specially crafted Microsoft Office documents spread using phishing techniques.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2019 (32-bit editions)
Microsoft Office 2019 (64-bit editions)
Microsoft Office LTSC 2021 (32-bit editions)
Microsoft Office LTSC 2021 (64-bit editions)
Office365 Semi-Annual Channel Extended (versions 2208 and 2202)

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-03-13 27.748 Sig Added
2023-10-05 25.651 Sig Added
2023-08-03 25.614 Sig Added
2022-06-09 21.336 Sig Added
2021-12-15 19.219 Sig Added
2021-11-08 18.192 Sig Added
2021-09-30 18.168 Sig Added
2020-11-16 16.962 Sig Added
2019-07-03 14.642 Sig Added
2019-06-13 14.632 Sig Added