Description
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
Published: 2017-04-12
Score: 7.8 High
EPSS: 94.3% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Mon, 10 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Microsoft Office Windows 7 Windows Server 2008 Windows Server 2012 Windows Vista
Philips Intellispace Portal
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-10-21T23:55:42.609Z

Reserved: 2016-09-09T00:00:00.000Z

Link: CVE-2017-0199

cve-icon Vulnrichment

Updated: 2024-08-05T12:55:19.131Z

cve-icon NVD

Status : Analyzed

Published: 2017-04-12T14:59:01.157

Modified: 2026-04-22T13:50:36.633

Link: CVE-2017-0199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses