Microsoft Office Remote Code Execution Vulnerability
RISK: Extremely High Risk
TYPE: Clients - Productivity Products

A vulnerability was identified in Microsoft Office, a remote user can exploit this vulnerability to perform remote code execution on the targeted system.
Note:
- The vulnerability is being exploited in the wild.
- No patch is currently available.
Impact
- Remote Code Execution
System / Technologies affected
- All versions of Microsoft Office, including Office 2016 on Windows 10
Solutions
- No patch is currently available.
Workaround:
Enable the "File Block Settings", please refer to the workaround example below for Word 2016, for other versions of Office, the path is different, please change the path according to your installed version.
Workaround example for Word 2016:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock]
"OpenInProtectedView"=dword:00000000
"RtfFiles"=dword:00000002
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with