Vulnerability Description
Visual Studio Tools for Office Runtime Spoofing Vulnerability
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | 365 Apps | - |
| Microsoft | Office | 2019 |
| Microsoft | Office Long Term Servicing Channel | 2021 |
| Microsoft | Visual Studio 2010 Tools For Office Runtime | - |
| Microsoft | Visual Studio 2017 | >= 15.0, < 15.9.56 |
| Microsoft | Visual Studio 2019 | >= 16.0, < 16.11.29 |
| Microsoft | Visual Studio 2022 | >= 17.2.0, < 17.2.18 |
Related Weaknesses (CWE)
References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897PatchVendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897PatchVendor Advisory
FAQ
What is CVE-2023-36897?
CVE-2023-36897 is a vulnerability with a CVSS score of 8.1 (HIGH). Visual Studio Tools for Office Runtime Spoofing Vulnerability
How severe is CVE-2023-36897?
CVE-2023-36897 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36897?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft 365 Apps, Microsoft Office, Microsoft Office Long Term Servicing Channel, Microsoft Visual Studio 2010 Tools For Office Runtime, Microsoft Visual Studio 2017.