If patching is not possible, MS recommends reading emails in plain text format or using the Office File Block policy to prevent RTF documents.
Microsoft Office LTSC 2021 for 32-bit editionsĪpply the appropriate KB from.Microsoft SharePoint Server Subscription Edition.Microsoft Office LTSC 2021 for 64-bit editions.Microsoft 365 Apps for Enterprise for 32-bit Systems.SharePoint Server Subscription Edition Language Pack.Microsoft 365 Apps for Enterprise for 64-bit Systems.Microsoft SharePoint Enterprise Server 2016.Microsoft SharePoint Enterprise Server 2013 Service Pack 1.Microsoft Office Web Apps Server 2013 Service Pack 1.Microsoft SharePoint Foundation 2013 Service Pack 1.Microsoft Word 2013 Service Pack 1 (32-bit editions).Microsoft Word 2013 Service Pack 1 (64-bit editions).Microsoft Office 2019 for 64-bit editions.Microsoft Office 2019 for 32-bit editions.A proof-of-concept for this vulnerability was released last weekend and could be a sign of upcoming malware campaigns. The vulnerability CVE-2023-21716 is of low complexity and could be exploited by sending an email with a rich text format (RTF) payload that, when opened or viewed in Outlook’s “Preview Pane”, leads to command execution. As such, we are issuing this advisory to call this to your attention and asking you to update your devices now. In February, Microsoft released a patch for a critical vulnerability in Word, SharePoint, Office 365, and Office for Mac that could allow remote code execution.