CVE-2023-3314811.07.2023, 18:15Microsoft Office Elevation of Privilege VulnerabilityLink FollowingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7.8 HIGHLOCALLOWLOWCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HmicrosoftCNA7.8 HIGHCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CCVEADP------CISA-ADPADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 75%VendorProductVersionmicrosoft365_apps-microsoft365_apps𝑥< 2306microsoftoffice𝑥< 2306𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.htmlCommon Weakness EnumerationCWE-59 - Improper Link Resolution Before File Access ('Link Following')The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Referenceshttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.htmlhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148https://packetstorm.news/files/id/173591