CVE-2023-28285

7.8 HIGH

📋 TL;DR

CVE-2023-28285 is a use-after-free vulnerability in Microsoft Office that allows remote code execution when a user opens a specially crafted malicious document. Attackers can exploit this to execute arbitrary code with the privileges of the current user. All users running affected Microsoft Office versions are vulnerable.

💻 Affected Systems

Products:
  • Microsoft Office
  • Microsoft 365 Apps
  • Microsoft Office LTSC 2021
  • Microsoft Office 2019
  • Microsoft Office 2016
Versions: Multiple versions prior to May 2023 security updates
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Office versions are vulnerable. Microsoft 365 Apps automatically update, but manual update installations may be required for perpetual versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Malware installation, credential theft, and data exfiltration through malicious Office documents delivered via phishing or compromised websites.

🟢

If Mitigated

Limited impact with proper application control policies, macro restrictions, and user training preventing malicious document execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious documents, but commonly exploited through phishing campaigns targeting internet-facing users.
🏢 Internal Only: HIGH - Internal users frequently exchange Office documents, and exploitation can lead to lateral movement within corporate networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user interaction to open malicious document. Multiple proof-of-concept exploits are publicly available, and active exploitation has been observed in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in May 2023 (e.g., Version 2305 Build 16.0.16501.20074 for Microsoft 365)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28285

Restart Required: Yes

Instructions:

1. Open any Office application. 2. Go to File > Account > Update Options > Update Now. 3. For enterprise deployments, deploy the May 2023 security updates through Microsoft Update, WSUS, or Configuration Manager.

🔧 Temporary Workarounds

Block Office file types via Group Policy

windows

Prevent execution of potentially malicious Office documents by blocking specific file extensions

Use Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies

Enable Attack Surface Reduction rules

windows

Use Microsoft Defender Attack Surface Reduction to block Office from creating child processes

Set-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EFC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled

🧯 If You Can't Patch

  • Implement application control policies to allow only trusted Office applications
  • Disable all Office macros and implement user training about not opening untrusted documents

🔍 How to Verify

Check if Vulnerable:

Check Office version in any Office app: File > Account > About [Application]. Compare against patched versions from Microsoft advisory.

Check Version:

In PowerShell: Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object {$_.DisplayName -like "*Office*"} | Select-Object DisplayName, DisplayVersion

Verify Fix Applied:

Verify Office version is at or above the patched version listed in Microsoft's security update. Check Windows Update history for May 2023 Office security updates.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Office application crashes, suspicious child process creation from Office apps
  • Microsoft Defender alerts for Office exploitation

Network Indicators:

  • Unusual outbound connections from Office processes
  • Downloads of Office documents from suspicious sources

SIEM Query:

source="Windows Security" EventID=4688 ParentProcessName="WINWORD.EXE" OR ParentProcessName="EXCEL.EXE" OR ParentProcessName="POWERPNT.EXE"

🔗 References

📤 Share & Export