CVE-2016-7193
highCVSS v3 Base Score
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score
71.2%
Exploitation probability in 30 days
Top 1% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Published: October 14, 2016 (3500 days ago)
Last Modified: April 22, 2026
Vendor: Microsoft
Source: NVD
⚠️ CISA Known Exploited Vulnerability
Added to KEV: 2022-03-03
Remediation Due: 2022-03-24 (⚠ 1513d overdue)
Vulnerability Report
Generated by CyberWatcher
Description
Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."
CWE
CWE-119Affected Products
microsoft officemicrosoft office compatibility packmicrosoft wordmicrosoft word viewer