CVE-2016-7193
high-risk
Published 2016-10-14
Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."
Do I need to act?
!
71.2% chance of exploitation in next 30 days
EPSS score — higher than 29% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (10)
Affected Vendors
References (7)
Broken Link
http://www.securityfocus.com/bid/93372
Broken Link
http://www.securitytracker.com/id/1036984
Broken Link
http://www.securityfocus.com/bid/93372
Broken Link
http://www.securitytracker.com/id/1036984
66
/ 100
high-risk
Severity
24/34 · High
Exploitability
26/34 · High
Exposure
16/34 · Moderate