CVE-2023-36762

7.3 HIGH

📋 TL;DR

CVE-2023-36762 is a remote code execution vulnerability in Microsoft Word that allows attackers to execute arbitrary code on a victim's system by tricking them into opening a specially crafted malicious document. This affects users of Microsoft Word across multiple platforms. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Microsoft Word
  • Microsoft Office
  • Microsoft 365 Apps
Versions: Multiple versions - see Microsoft Security Update Guide for specifics
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both desktop and online versions. Requires user interaction to open malicious document.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data theft, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Malware installation, credential theft, data exfiltration, and persistence establishment on the compromised system.

🟢

If Mitigated

Limited impact with proper security controls - potentially blocked by antivirus, application whitelisting, or macro security settings.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to deliver malicious document. User must open the document for exploitation to occur.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific patch versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36762

Restart Required: Yes

Instructions:

1. Open Microsoft Word. 2. Go to File > Account > Update Options > Update Now. 3. Restart Word/Office when prompted. 4. For enterprise: Deploy through Microsoft Update, WSUS, or Configuration Manager.

🔧 Temporary Workarounds

Disable automatic document opening

windows

Prevent automatic opening of Word documents from untrusted sources

Set registry key: HKCU\Software\Microsoft\Office\16.0\Word\Security\FileValidation\DisableEditFromPV = 1

Enable Protected View

windows

Force documents from internet sources to open in Protected View

Set registry key: HKCU\Software\Microsoft\Office\16.0\Word\Security\ProtectedView\DisableInternetFilesInPV = 0

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Word execution
  • Deploy email filtering to block suspicious attachments and enable macro security policies

🔍 How to Verify

Check if Vulnerable:

Check Word version and compare against patched versions in Microsoft advisory

Check Version:

In Word: File > Account > About Word (shows version)

Verify Fix Applied:

Verify Word version matches patched version from Microsoft Security Update Guide

📡 Detection & Monitoring

Log Indicators:

  • Unusual Word process spawning child processes
  • Word documents from external sources with suspicious content
  • Failed macro execution attempts

Network Indicators:

  • Outbound connections from Word process to suspicious IPs
  • DNS requests for known malicious domains from Office processes

SIEM Query:

Process Creation where (ParentImage contains "WINWORD.EXE" AND CommandLine contains suspicious patterns)

🔗 References

📤 Share & Export