Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36761: CWE-20: Improper Input Validation in Microsoft Microsoft Office 2019

0
Medium
VulnerabilityCVE-2023-36761cvecve-2023-36761cwe-20
Published: Tue Sep 12 2023 (09/12/2023, 16:58:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Microsoft Word Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 10/31/2025, 04:36:00 UTC

Technical Analysis

CVE-2023-36761 is a vulnerability identified in Microsoft Office 2019, specifically affecting the Microsoft Word component. The root cause is improper input validation (CWE-20), which means that Microsoft Word fails to correctly validate or sanitize certain inputs from crafted documents. This flaw can be exploited by an attacker to cause information disclosure, potentially leaking sensitive data from the victim's environment. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R), such as opening a malicious Word document. The vulnerability does not impact integrity or availability, focusing solely on confidentiality. The CVSS 3.1 base score is 6.5, indicating a medium severity level. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability was reserved in June 2023 and published in September 2023. Since the vulnerability involves crafted documents, it is likely that phishing or social engineering could be used to deliver the exploit. The lack of patches means organizations must rely on mitigations until Microsoft issues updates. This vulnerability is significant due to the widespread use of Microsoft Office 2019 in enterprises globally, including Europe.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information leakage if users open malicious Word documents. This could lead to exposure of confidential business data, intellectual property, or personal information, potentially resulting in reputational damage, regulatory penalties under GDPR, and competitive disadvantages. Sectors such as government, finance, healthcare, and critical infrastructure are particularly vulnerable due to the sensitivity of their data and the high usage of Microsoft Office products. Since exploitation requires user interaction, the risk is somewhat mitigated by user awareness but remains significant given the prevalence of phishing attacks. The absence of known exploits reduces immediate risk, but the medium severity score and potential for future exploitation necessitate proactive measures. The vulnerability does not affect system integrity or availability, so it is less likely to cause operational disruption but can still undermine confidentiality.

Mitigation Recommendations

1. Educate users to be vigilant about opening Word documents from untrusted or unexpected sources, emphasizing the risk of phishing and social engineering. 2. Disable or restrict macros and external content loading in Microsoft Word to reduce attack surface. 3. Employ email filtering and attachment scanning to detect and block malicious documents before reaching end users. 4. Use endpoint protection solutions with behavior-based detection to identify suspicious document activity. 5. Monitor security advisories from Microsoft closely and prepare to deploy patches immediately upon release. 6. Implement network segmentation and data loss prevention (DLP) controls to limit the impact of any information disclosure. 7. Consider using application whitelisting or sandboxing for document handling in high-risk environments. 8. Regularly audit and update security policies related to document handling and user privileges. These steps go beyond generic advice by focusing on user behavior, technical controls specific to document handling, and organizational preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-27T15:11:59.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9aa247d717aace21f22

Added to database: 10/21/2025, 7:06:18 PM

Last enriched: 10/31/2025, 4:36:00 AM

Last updated: 12/14/2025, 8:37:22 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats