9.3
CVSSv2

CVE-2017-0262

Published: 12/05/2017 Updated: 03/10/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 830
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office 2016

microsoft office 2013

microsoft office 2010

Recent Articles

A Slice of 2017 Sofacy Activity
Securelist • GReAT • 20 Feb 2018

Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a highly active and prolific APT. From their high volume 0day deployment to their innovative and broad malware set, Sofacy is one of the top groups that we monitor, report, and protect against. 2017 was not any different in this regard. Our private reports subscription customers receive a steady stream of YARA, IOC, and reports on Sofacy, our most reported APT for the year. This high level of cyber-espionage activity goes back years. In ...

IT threat evolution Q2 2017. Statistics
Securelist • Roman Unuchek Fedor Sinitsyn Denis Parinov Alexander Liskin • 15 Aug 2017

According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world. 33, 006, 783 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 224, 675 user computers. Crypto ransomware attacks were blocked on 246, 675 computers of unique users. Kaspersky Lab’s file antivirus de...

APT Trends report Q2 2017
Securelist • GReAT • 08 Aug 2017

Since 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service. Prior to the new service offering, GReAT published research online for the general public in an effort to help combat the ever-increasing threat from nation-state and other advanced actors.  Since we began offering a threat intelligence service, all deep technical ...

It's 2017 and Windows PCs are being owned by EPS files, webpages
The Register • Shaun Nichols in San Francisco • 09 May 2017

Get patching ASAP as exploits are being used in the wild – and fix Adobe stuff, too

Microsoft has today published patches for more than 50 security flaws in its products – including three serious holes being exploited right now in the wild. These updates should be applied as soon as possible. The May edition of Patch Tuesday addresses blunders in Internet Explorer, Edge, Windows, Office, and the .NET Framework. In total, 55 bugs have been squashed, including 17 that have been rated as critical security risks. Of the three bad bugs being actively exploited in the wild, two can...