Attacker Value
Very High
(1 user assessed)
Exploitability
Very High
(1 user assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
5

CVE-2023-36884

Disclosure Date: July 11, 2023
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Windows Search Remote Code Execution Vulnerability

Add Assessment

1
Ratings
Technical Analysis

CVE-2023-36884 is a fixed vulnerability that permitted remote code execution. Attackers could manipulate Microsoft Office files to bypass the Mark of the Web (MoTW) security mechanism. This bypass allowed these documents to be accessed without a security prompt, facilitating remote code execution. In response to the once-mitigated but still exploited CVE-2023-36884 weakness, Microsoft rolled out an Office Defense in Depth patch as part of August 2023 Patch Tuesday.

The Russian cyber group, Storm-0978/RomCom, has been actively exploiting this flaw.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
5.9
Exploitability Score:
1.6
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • microsoft

Products

  • office 2019,
  • office 2021,
  • windows 10 1507 -,
  • windows 10 1607 -,
  • windows 10 1809 -,
  • windows 10 21h2 -,
  • windows 10 22h2 -,
  • windows 11 21h2 -,
  • windows 11 22h2,
  • windows server 2008 -,
  • windows server 2008 r2,
  • windows server 2012 -,
  • windows server 2012 r2,
  • windows server 2016 -,
  • windows server 2019 -,
  • windows server 2022 -,
  • word 2013,
  • word 2016

References

Exploit
The following exploit POCs have not been verified by Rapid7 researchers, but are sourced from: nomi-sec/PoC-in-GitHub.
Additional sources will be added here as they become relevant.
Notes: We will only add the top 3 POCs for a given CVE. POCs added here must have at least 2 GitHub stars.

Additional Info

Technical Analysis