Vulnerability Description
An elevation of privilege vulnerability exists in Microsoft Office OLicenseHeartbeat task, where an attacker who successfully exploited this vulnerability could run this task as SYSTEM.To exploit the vulnerability, an authenticated attacker would need to place a specially crafted file in a specific location, thereby allowing arbitrary file corruption.The security update addresses the vulnerability by correcting how the process validates the log file., aka 'Microsoft Office Tampering Vulnerability'.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Office 365 Proplus | - |
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0697PatchVendor Advisory
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0697PatchVendor Advisory
FAQ
What is CVE-2020-0697?
CVE-2020-0697 is a vulnerability with a CVSS score of 7.8 (HIGH). An elevation of privilege vulnerability exists in Microsoft Office OLicenseHeartbeat task, where an attacker who successfully exploited this vulnerability could run this task as SYSTEM.To exploit the ...
How severe is CVE-2020-0697?
CVE-2020-0697 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-0697?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Office 365 Proplus.