CVE-2024-20677
Microsoft Office Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer.
3D models in Office documents that were previously inserted from a FBX file will continue to work as expected unless the Link to File option was chosen at insert time.
This change is effective as of the January 9, 2024 security update.
<p>Existe una vulnerabilidad de seguridad en FBX que podría provocar la ejecución remota de código. Para mitigar esta vulnerabilidad, se deshabilitó la capacidad de insertar archivos FBX en Word, Excel, PowerPoint y Outlook para Windows y Mac. Las versiones de Office que tenían esta función habilitada ya no tendrán acceso a ella. Esto incluye Office 2019, Office 2021, Office LTSC para Mac 2021 y Microsoft 365.</p> <p>Los modelos 3D en documentos de Office que se insertaron previamente desde un archivo FBX seguirán funcionando como se espera a menos que se active la opción Vincular a Archivo. se eligió en el momento de la inserción.</p> <p>Este cambio entra en vigor a partir de la actualización de seguridad del 9 de enero de 2024.</p>
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of FBX files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-11-28 CVE Reserved
- 2024-01-09 CVE Published
- 2024-01-18 EPSS Updated
- 2024-10-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20677 | 2024-05-29 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | 365 Apps Search vendor "Microsoft" for product "365 Apps" | - | enterprise |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Office Search vendor "Microsoft" for product "Office" | 2019 Search vendor "Microsoft" for product "Office" and version "2019" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Office Long Term Servicing Channel Search vendor "Microsoft" for product "Office Long Term Servicing Channel" | 2021 Search vendor "Microsoft" for product "Office Long Term Servicing Channel" and version "2021" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Office Long Term Servicing Channel Search vendor "Microsoft" for product "Office Long Term Servicing Channel" | 2021 Search vendor "Microsoft" for product "Office Long Term Servicing Channel" and version "2021" | macos |
Affected
|