// For flags

CVE-2020-12801

Crash-recovered MSOffice encrypted documents defaulted to not to using encryption on next save

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.

Si LibreOffice presenta un documento encriptado abierto y se bloquea, ese documento se guarda automáticamente encriptado. Al reiniciar, LibreOffice ofrece restaurar el documento y pide la contraseña para desencriptarlo. Si la recuperación es exitosa, y si el formato de archivo del documento recuperado no era el formato de archivo ODF predeterminado de LibreOffice, entonces las versiones afectadas predeterminadas de LibreOffice que guarden posteriormente el documento están sin cifrar. Esto puede conllevar a que un usuario guarde accidentalmente un documento de formato de archivo MSOffice sin cifrar mientras cree que está cifrado. Este problema afecta: LibreOffice serie 6-3 versiones de anteriores a 6.3.6; serie 6-4 versiones anteriores a 6.4.3.

*Credits: Thanks to Tomas Florian <tomas@armoreye.ca> for raising awareness of the issue
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-05-12 CVE Reserved
  • 2020-05-18 CVE Published
  • 2024-03-22 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-311: Missing Encryption of Sensitive Data
  • CWE-312: Cleartext Storage of Sensitive Information
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libreoffice
Search vendor "Libreoffice"
Libreoffice
Search vendor "Libreoffice" for product "Libreoffice"
>= 6.3.0 < 6.3.6
Search vendor "Libreoffice" for product "Libreoffice" and version " >= 6.3.0 < 6.3.6"
-
Affected
Libreoffice
Search vendor "Libreoffice"
Libreoffice
Search vendor "Libreoffice" for product "Libreoffice"
>= 6.4.0 < 6.4.3
Search vendor "Libreoffice" for product "Libreoffice" and version " >= 6.4.0 < 6.4.3"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.1
Search vendor "Opensuse" for product "Leap" and version "15.1"
-
Affected