CVE-2024-20677
vulnerability analysis and mitigation

Overview

CVE-2024-20677 is a remote code execution vulnerability discovered in Microsoft Office's FBX file handling functionality. The vulnerability affects multiple Microsoft Office products including Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365 Apps for Enterprise. The issue was disclosed on January 9, 2024, with a CVSS score of 7.8 (High) (NVD).

Technical details

The vulnerability exists within the parsing of FBX files and results from the lack of validating the existence of an object prior to performing operations on the object. It has been classified as a use-after-free vulnerability that could lead to remote code execution. The CVSS vector string is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access is required with user interaction (ZDI).

Impact

If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the current process. The attack requires user interaction, specifically opening a malicious file containing specially crafted FBX 3D model files (Arctic Wolf).

Mitigation and workarounds

Microsoft has addressed this vulnerability by disabling the ability to insert FBX files in Word, Excel, PowerPoint, and Outlook for Windows and Mac. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer. Previously inserted 3D models from FBX files will continue to work as expected unless the Link to File option was chosen at insert time (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management