9.3

CVE-2007-0671

Warning

Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.

Data is provided by the National Vulnerability Database (NVD)
MicrosoftAccess Version2000
MicrosoftAccess Version2002
MicrosoftAccess Version2003
MicrosoftExcel Version2000
MicrosoftExcel Version2002
MicrosoftExcel Version2003
MicrosoftExcel Version2004 Editionmac
MicrosoftExcel Viewer Version2003
MicrosoftFrontpage Version2000
MicrosoftFrontpage Version2002
MicrosoftFrontpage Version2003
MicrosoftInfopath Version2003
MicrosoftOffice Version2000 Updatesp3
MicrosoftOffice Version2003 Updatesp2
MicrosoftOffice Version2004 Editionmac
MicrosoftOffice Versionxp Updatesp3
MicrosoftOnenote Version2003
MicrosoftOutlook Version2000
MicrosoftOutlook Version2002
MicrosoftOutlook Version2003
MicrosoftPowerpoint Version2000
MicrosoftPowerpoint Version2002
MicrosoftPowerpoint Version2003
MicrosoftPowerpoint Version2004 Editionmac
MicrosoftProject Version2000 Updatesr1
MicrosoftProject Version2002 Updatesp1
MicrosoftProject Version2003
MicrosoftPublisher Version2000
MicrosoftPublisher Version2002
MicrosoftPublisher Version2003
MicrosoftVisio Version2002 Updatesp2
MicrosoftVisio Version2003
MicrosoftWord Version2000
MicrosoftWord Version2002
MicrosoftWord Version2003
MicrosoftWord Viewer Version2003

12.08.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Office Excel Remote Code Execution Vulnerability

Vulnerability

Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.

Description

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 68.36% 0.986
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H