CVE-2023-36897

8.1 HIGH

📋 TL;DR

This vulnerability in Visual Studio Tools for Office Runtime allows attackers to spoof file paths, potentially tricking users into opening malicious files. It affects systems running vulnerable versions of VSTO Runtime. Users who open specially crafted Office documents could be impacted.

💻 Affected Systems

Products:
  • Microsoft Visual Studio Tools for Office Runtime
Versions: Multiple versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where VSTO Runtime is installed, typically through Office add-ins or development tools.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary code with the privileges of the current user, leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Attackers trick users into opening malicious Office documents that appear legitimate, leading to malware installation or credential theft.

🟢

If Mitigated

With proper security controls, the impact is limited to user-level actions within sandboxed environments, preventing system-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious document) and social engineering to be effective.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest security update for VSTO Runtime

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897

Restart Required: Yes

Instructions:

1. Apply the latest Windows Update. 2. Ensure Office updates are installed. 3. Restart affected systems. 4. Verify VSTO Runtime is updated to the patched version.

🔧 Temporary Workarounds

Disable Office Add-ins

windows

Temporarily disable VSTO-based Office add-ins to reduce attack surface

Office settings > Add-ins > Manage COM Add-ins > Uncheck VSTO add-ins

Enable Protected View

windows

Force Office documents from untrusted sources to open in Protected View

File > Options > Trust Center > Trust Center Settings > Protected View > Enable all options

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables
  • Use network segmentation to isolate vulnerable systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check VSTO Runtime version in Control Panel > Programs and Features

Check Version:

wmic product where "name like 'Microsoft Visual Studio Tools for Office%'" get version

Verify Fix Applied:

Verify VSTO Runtime version matches patched version from Microsoft advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual Office document launches with VSTO components
  • Process creation from Office applications to unexpected locations

Network Indicators:

  • Office applications making unexpected network connections after document opens

SIEM Query:

source="windows" (process_name="winword.exe" OR process_name="excel.exe" OR process_name="powerpnt.exe") AND process_call_trace="*vsto*" AND file_path="*suspicious*"

🔗 References

📤 Share & Export