CVE-2020-16855

5.5 MEDIUM

📋 TL;DR

This CVE describes an information disclosure vulnerability in Microsoft Office where uninitialized memory could be read when opening specially crafted files. Attackers could exploit this to view out-of-bounds memory contents. Users who open malicious Office files with affected versions are at risk.

💻 Affected Systems

Products:
  • Microsoft Office
Versions: Specific affected versions would be detailed in Microsoft's advisory
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to open a specially crafted Office file. Exact affected versions should be verified against Microsoft's advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive memory contents including credentials, encryption keys, or other application data could be leaked to an attacker.

🟠

Likely Case

Limited information disclosure from Office application memory, potentially revealing document fragments or application state.

🟢

If Mitigated

No impact if users don't open untrusted Office files or have patched systems.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing with malicious Office attachments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of file format manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Available through Microsoft's October 2020 security updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16855

Restart Required: Yes

Instructions:

1. Apply Microsoft's October 2020 security updates for Office. 2. Restart affected systems. 3. Verify Office version is updated.

🔧 Temporary Workarounds

Block Office file types via email filtering

all

Prevent delivery of potentially malicious Office files via email

Use Office Protected View

windows

Configure Office to open untrusted files in Protected View mode

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Office file execution
  • Train users to avoid opening Office files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Office version against Microsoft's advisory for affected versions

Check Version:

In Office: File > Account > About [Application]

Verify Fix Applied:

Verify Office has October 2020 or later security updates installed

📡 Detection & Monitoring

Log Indicators:

  • Office application crashes with memory access violations
  • Unusual Office file openings from email attachments

Network Indicators:

  • N/A - local exploitation only

SIEM Query:

Office application crash events with memory exception codes

🔗 References

📤 Share & Export