Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36761: CWE-20: Improper Input Validation in Microsoft Microsoft Office 2019

0
Medium
VulnerabilityCVE-2023-36761cvecve-2023-36761cwe-20
Published: Tue Sep 12 2023 (09/12/2023, 16:58:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Microsoft Word Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 10/21/2025, 20:47:51 UTC

Technical Analysis

CVE-2023-36761 is a vulnerability identified in Microsoft Office 2019, specifically affecting the Word component. It is classified under CWE-20, indicating improper input validation. This flaw allows an attacker to craft malicious Word documents that, when opened by a user, can lead to unauthorized information disclosure. The vulnerability is exploitable remotely over the network without requiring any privileges or authentication, but it does require user interaction, such as opening or previewing a malicious document. The CVSS 3.1 base score is 6.5, categorized as medium severity, with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high confidentiality impact (C:H) but no impact on integrity or availability. The vulnerability was published on September 12, 2023, and no known exploits have been reported in the wild to date. The root cause is improper input validation, which may allow sensitive information to be leaked from the affected system. Microsoft Office 2019 version 19.0.0 is confirmed affected, and while no patch links are currently provided, it is expected that Microsoft will release updates to address this issue. Organizations relying on Microsoft Office 2019 for document processing are advised to monitor for patches and apply them promptly once available.

Potential Impact

The primary impact of CVE-2023-36761 is unauthorized disclosure of sensitive information from affected systems running Microsoft Office 2019. For European organizations, this could lead to leakage of confidential business data, intellectual property, or personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to deliver malicious documents, increasing the risk in sectors with high document exchange such as finance, legal, and government. The lack of impact on integrity and availability limits the threat to confidentiality only, but the ease of exploitation over the network without privileges means a wide range of users could be targeted. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat of future exploitation. Organizations with extensive use of Microsoft Office 2019, especially those with remote or hybrid workforces, may face increased exposure.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for Microsoft Office 2019 as soon as they are released. 2. Implement strict email filtering and attachment scanning to block or flag suspicious Word documents, especially from unknown or untrusted sources. 3. Educate users on the risks of opening unsolicited or unexpected documents and train them to recognize phishing attempts. 4. Use application control or sandboxing technologies to isolate document processing and limit potential data leakage. 5. Employ Data Loss Prevention (DLP) solutions to detect and prevent unauthorized transmission of sensitive information. 6. Disable or restrict macros and other active content in Office documents where possible to reduce attack surface. 7. Maintain up-to-date endpoint protection and network monitoring to detect anomalous behavior related to document handling. 8. Review and tighten access controls and permissions on sensitive documents to minimize exposure if a disclosure occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-27T15:11:59.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9aa247d717aace21f22

Added to database: 10/21/2025, 7:06:18 PM

Last enriched: 10/21/2025, 8:47:51 PM

Last updated: 10/30/2025, 2:17:04 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats