CVE-2020-16933

7.0 HIGH

📋 TL;DR

CVE-2020-16933 is a security feature bypass vulnerability in Microsoft Word that allows specially crafted .LNK files to execute actions with the current user's permissions. Attackers can exploit this by tricking users into opening malicious files via email or compromised websites. This affects users running vulnerable versions of Microsoft Word.

💻 Affected Systems

Products:
  • Microsoft Word
Versions: Specific versions as listed in Microsoft advisory (typically Office 2016, 2019, and Office 365 ProPlus)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious file. All default configurations of affected Word versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of user account leading to data theft, malware installation, lateral movement within network, and privilege escalation if user has administrative rights.

🟠

Likely Case

Malware execution, credential theft, or data exfiltration from the compromised user's system.

🟢

If Mitigated

Limited impact with proper email filtering, user awareness training, and application whitelisting preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open malicious file. No authentication bypass needed as attack targets the user's session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2020 security updates for Microsoft Office

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16933

Restart Required: Yes

Instructions:

1. Apply October 2020 Microsoft Office security updates through Windows Update or Microsoft Update. 2. Restart affected systems. 3. Verify update installation in Control Panel > Programs > Programs and Features > View installed updates.

🔧 Temporary Workarounds

Block .LNK files via email filtering

all

Configure email security gateways to block or quarantine emails containing .LNK attachments.

Disable .LNK file handling in Word

windows

Configure Group Policy or registry settings to prevent Word from opening .LNK files.

Registry: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\FileBlock\LNKFiles = 2

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executable execution
  • Enforce user awareness training about opening suspicious email attachments

🔍 How to Verify

Check if Vulnerable:

Check Office version against Microsoft's October 2020 security bulletin. Vulnerable if running affected Word versions without October 2020 updates.

Check Version:

In Word: File > Account > About Word shows version. Command line: wmic product where "name like 'Microsoft Office%'" get version

Verify Fix Applied:

Verify Office version is updated to October 2020 or later security updates. Check Windows Update history for KB4579978 or later Office security updates.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Process creation events for suspicious child processes from WINWORD.EXE
  • Office telemetry logs showing .LNK file opens

Network Indicators:

  • Outbound connections from Word process to suspicious domains
  • DNS queries for command and control infrastructure

SIEM Query:

Process Creation where ParentImage contains "WINWORD.EXE" and (CommandLine contains ".lnk" or Image contains suspicious executables)

🔗 References

📤 Share & Export