CVE-2020-0652

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on systems running vulnerable Microsoft Office software by exploiting memory corruption when handling objects. It affects users who open malicious Office documents, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Microsoft Office 2019
  • Microsoft Office 2016
  • Microsoft Office 2013
  • Microsoft Office 2010
  • Microsoft 365 Apps for Enterprise
Versions: All versions prior to security updates released in January 2020
Operating Systems: Windows 10, Windows 8.1, Windows 7, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2008 R2
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open a malicious Office document. All default installations are vulnerable without patches.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement across networks.

🟠

Likely Case

Malware installation, credential theft, and persistent backdoor access to the compromised system.

🟢

If Mitigated

Limited impact with proper application whitelisting, macro restrictions, and user training preventing malicious document execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious document. Proof-of-concept code has been publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in January 2020 (e.g., KB4484381 for Office 2019)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0652

Restart Required: Yes

Instructions:

1. Open Microsoft Office application. 2. Go to File > Account > Update Options > Update Now. 3. Alternatively, use Windows Update to install the latest security updates. 4. Restart the system after installation.

🔧 Temporary Workarounds

Disable Office macro execution

windows

Prevents malicious macros from executing in Office documents

Set GPO: Computer Configuration > Administrative Templates > Microsoft Office 2016 > Security Settings > Trust Center > Disable all macros without notification

Use Office Viewer mode

windows

Open documents in Protected View to prevent automatic code execution

Set registry key: HKCU\Software\Microsoft\Office\16.0\Word\Security\ProtectedView = 1

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Office document execution
  • Deploy email filtering to block malicious attachments and train users to avoid opening suspicious documents

🔍 How to Verify

Check if Vulnerable:

Check Office version in File > Account > About [Application]. If version is prior to January 2020 updates, system is vulnerable.

Check Version:

wmic product where "name like 'Microsoft Office%'" get version

Verify Fix Applied:

Verify that the January 2020 security update is installed via Windows Update history or Office update status.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Application crashes (Event ID 1000), suspicious child processes spawned from Office applications
  • Office telemetry logs showing abnormal document behavior

Network Indicators:

  • Outbound connections from Office processes to unknown external IPs
  • DNS requests for suspicious domains from Office applications

SIEM Query:

source="windows" event_id=1000 process_name="WINWORD.EXE" OR process_name="EXCEL.EXE" OR process_name="POWERPNT.EXE"

🔗 References

📤 Share & Export