CVE-2023-29335

7.5 HIGH

📋 TL;DR

CVE-2023-29335 is a security feature bypass vulnerability in Microsoft Word that allows attackers to circumvent security protections and potentially execute malicious code. This affects users of Microsoft Word who open specially crafted documents. The vulnerability requires user interaction to trigger.

💻 Affected Systems

Products:
  • Microsoft Word
  • Microsoft Office
Versions: Microsoft Office 2019, 2021, and Microsoft 365 Apps for Enterprise prior to May 2023 updates
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit versions. Microsoft 365 Apps for Enterprise are affected if not updated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could bypass security features to execute arbitrary code with the privileges of the current user, potentially leading to full system compromise.

🟠

Likely Case

Attackers bypass security warnings to deliver malware via malicious Word documents, leading to initial access and potential data theft.

🟢

If Mitigated

With proper controls, the impact is limited to the user context with no privilege escalation beyond the current user's permissions.

🌐 Internet-Facing: MEDIUM - Attackers can deliver malicious documents via email or web downloads, but requires user interaction.
🏢 Internal Only: MEDIUM - Internal phishing campaigns could exploit this, but still requires user interaction to open documents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious document. No public exploit code is available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2023 security updates for Microsoft Office

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335

Restart Required: Yes

Instructions:

1. Open Microsoft Word. 2. Go to File > Account > Update Options > Update Now. 3. Alternatively, use Windows Update to install the May 2023 security updates for Office. 4. Restart the system after installation.

🔧 Temporary Workarounds

Block Office macros from the internet

windows

Configure Office to block macros from the internet, which can prevent execution of malicious content.

Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Office\16.0\Common\Security" -Name "BlockInternetMacros" -Value 1 -Type DWord

Use Microsoft Office Viewer

windows

Use Microsoft Office Viewer to open documents instead of the full Office application.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Office document execution
  • Use email filtering to block suspicious Office attachments and educate users about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check Office version in Word via File > Account > About Word. If version is older than May 2023 updates, it's vulnerable.

Check Version:

powershell "Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Office\ClickToRun\Configuration' | Select-Object VersionToReport"

Verify Fix Applied:

Verify Office version is updated to May 2023 or later via File > Account > About Word.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Word crashes or suspicious macro execution
  • Office telemetry showing document opening with unusual features

Network Indicators:

  • Unusual outbound connections from Office processes after document opening
  • Downloads of Office documents from suspicious sources

SIEM Query:

EventID=1 AND (Image LIKE '%WINWORD.EXE%' OR ParentImage LIKE '%WINWORD.EXE%') AND CommandLine CONTAINS '.doc'

🔗 References

📤 Share & Export