CVE-2023-3314811.07.2023, 18:15Microsoft Office Elevation of Privilege VulnerabilityLink FollowingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTPrimary7.8 HIGHLOCALLOWLOWCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HBase ScoreCVSS 3.xEPSS ScorePercentile: UnknownAffected Products (NVD)VendorProductVersionmicrosoft365_apps-𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.htmlCommon Weakness EnumerationCWE-59 - Improper Link Resolution Before File Access ('Link Following')The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Referenceshttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.htmlhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148https://packetstorm.news/files/id/173591