Skip to main content

CVE-2019-1035: Remote Code Execution in Microsoft Microsoft SharePoint Server 2019

High
VulnerabilityCVE-2019-1035cvecve-2019-1035
Published: Wed Jun 12 2019 (06/12/2019, 13:49:40 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Server 2019

Description

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory.

AI-Powered Analysis

AILast updated: 07/04/2025, 09:57:59 UTC

Technical Analysis

CVE-2019-1035 is a remote code execution (RCE) vulnerability affecting Microsoft Word software, specifically in the context of Microsoft SharePoint Server 2019 version 16.0.0. The vulnerability arises due to improper handling of objects in memory by Microsoft Word when processing files. An attacker can exploit this flaw by crafting a malicious Word document that, when opened by a user with an affected version of Microsoft Word, allows the attacker to execute arbitrary code within the security context of the current user. This means the attacker can perform any action that the logged-in user is permitted to do, potentially leading to unauthorized data access, modification, or further compromise of the system. Exploitation requires user interaction, typically by convincing the user to open a specially crafted file delivered via email or hosted on a malicious or compromised website. The attacker cannot force the user to open the file but relies on social engineering tactics such as phishing emails or instant messaging. The vulnerability is mitigated by a security update from Microsoft that corrects how Microsoft Word handles files in memory, preventing the malicious payload from executing. Notably, there are no known exploits in the wild, and no CVSS score has been assigned to this vulnerability.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily due to the widespread use of Microsoft Office products, including Word and SharePoint Server 2019, across enterprises, government agencies, and critical infrastructure sectors. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to gain control over affected systems, steal sensitive information, disrupt business operations, or move laterally within networks. Given that the attack vector involves user interaction through phishing or malicious websites, sectors with high email and document exchange volumes, such as finance, healthcare, and public administration, are particularly vulnerable. The potential impact includes data breaches, intellectual property theft, and operational disruption, which could have regulatory and reputational consequences under European data protection laws like GDPR. Although no known exploits exist currently, the vulnerability's nature makes it a plausible target for attackers employing social engineering, especially in environments where patching is delayed or incomplete.

Mitigation Recommendations

European organizations should prioritize applying the official Microsoft security update that addresses this vulnerability to all affected Microsoft Word and SharePoint Server 2019 installations. Beyond patching, organizations should implement advanced email filtering and anti-phishing solutions to reduce the likelihood of malicious documents reaching end users. User awareness training focused on recognizing phishing attempts and suspicious attachments is critical to prevent exploitation via social engineering. Network segmentation and the principle of least privilege should be enforced to limit the potential impact if a user account is compromised. Additionally, deploying endpoint detection and response (EDR) tools can help identify and contain suspicious activities resulting from exploitation attempts. Organizations should also monitor for unusual file execution behaviors and maintain robust backup and recovery processes to mitigate potential damage from successful attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2018-11-26T00:00:00
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aead72

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 9:57:59 AM

Last updated: 7/28/2025, 1:19:58 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats