CVE-2020-0991
vulnerability analysis and mitigation

Overview

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory (CVE-2020-0991). The vulnerability was disclosed and patched in April 2020 as part of Microsoft's regular security updates (Microsoft Support).

Technical details

The vulnerability affects Microsoft Office 2016 and related components. The security update addresses the vulnerability by correcting how Microsoft Office software handles objects in memory. The fix was included in security update 4484287 for both 32-bit and 64-bit versions of Office 2016 (Microsoft Support).

Impact

If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the current user. If the current user has administrative privileges, the attacker could take control of the affected system, install programs, view/change/delete data, or create new accounts with full user rights (Microsoft Support).

Mitigation and workarounds

Microsoft released security update 4484287 to address this vulnerability. The update is available through Microsoft Update, Microsoft Update Catalog, and Microsoft Download Center. Users can obtain the update through automatic updates or by downloading the standalone package for either 32-bit or 64-bit versions of Office 2016 (Microsoft Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management