CVE-2020-16929

7.8 HIGH

📋 TL;DR

CVE-2020-16929 is a remote code execution vulnerability in Microsoft Excel caused by improper memory object handling. An attacker can execute arbitrary code by tricking a user into opening a malicious Excel file. All users running affected Excel versions are vulnerable if they open untrusted files.

💻 Affected Systems

Products:
  • Microsoft Excel
  • Microsoft Office
Versions: Microsoft Excel 2010, 2013, 2016, 2019; Microsoft 365 Apps for Enterprise; Office Online Server; SharePoint Server
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Excel versions are vulnerable. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing attacker to install malware, steal data, create backdoors, and pivot to other systems.

🟠

Likely Case

Limited user account compromise leading to data theft, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

No impact if users don't open malicious files or if macros/active content are disabled.

🌐 Internet-Facing: MEDIUM - Requires user interaction via email or web download, but common attack vector.
🏢 Internal Only: HIGH - Internal phishing campaigns and file shares can easily distribute malicious Excel files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to open malicious Excel file. Multiple proof-of-concepts exist in security community.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2020 security updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16929

Restart Required: Yes

Instructions:

1. Open Excel. 2. Go to File > Account > Update Options > Update Now. 3. Install October 2020 security updates. 4. Restart computer if prompted.

🔧 Temporary Workarounds

Disable automatic opening of Excel files

windows

Configure Excel to open files in Protected View or disable automatic opening from email/web

Set registry key: HKCU\Software\Microsoft\Office\16.0\Excel\Security\ProtectedView with appropriate values

Block Office macros from internet files

windows

Prevent Excel from running macros in files from internet sources

Set GPO: Computer Configuration > Administrative Templates > Microsoft Office 2016 > Security Settings > Trust Center > Block macros from running in Office files from the Internet

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Excel execution
  • Deploy email filtering to block malicious attachments and train users on phishing awareness

🔍 How to Verify

Check if Vulnerable:

Check Excel version: Open Excel > File > Account > About Excel. If version is before October 2020 updates, system is vulnerable.

Check Version:

In Excel: File > Account > About Excel

Verify Fix Applied:

Verify Excel version includes October 2020 updates (e.g., Version 2002 Build 12527.20278 or later for Microsoft 365)

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Excel crashes with memory access violations
  • Process creation from Excel spawning unusual child processes
  • Office telemetry showing malicious document properties

Network Indicators:

  • Outbound connections from Excel process to suspicious IPs
  • DNS requests for command and control domains following Excel execution

SIEM Query:

source="windows" event_id=1000 process_name="EXCEL.EXE" | search "Access violation" OR "memory"

🔗 References

📤 Share & Export