CVE-2018-0802

HIGH
2018-01-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 28, 2025 - 14:14 cisa
CISA KEV
PoC Detected
Oct 28, 2025 - 14:14 vuln.today
Public exploit code
Patch Released
Oct 28, 2025 - 14:14 nvd
Patch available
CVE Published
Jan 10, 2018 - 01:29 nvd
HIGH 7.8

Description

Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.

Analysis

Microsoft Office Equation Editor allows remote code execution through crafted documents, the third vulnerability in the Equation Editor trifecta (with CVE-2017-11882 and CVE-2018-0798) that collectively dominated the exploit landscape in 2018.

Technical Context

The CWE-787 flaw in EQNEDT32.EXE provides yet another exploitation path in the same unprotected binary. Like its siblings, the exploit is deterministic due to the absence of modern exploit mitigations in the 2000-era compiled binary.

Affected Products

['Microsoft Office 2007 SP3', 'Microsoft Office 2010 SP2', 'Microsoft Office 2013 SP1', 'Microsoft Office 2016']

Remediation

Apply all Equation Editor patches and then remove EQNEDT32.EXE entirely. Microsoft disabled the Equation Editor in later Office updates. Block documents containing equation objects at email gateways.

Priority Score

213
Low Medium High Critical
KEV: +50
EPSS: +93.9
CVSS: +39
POC: +20

Share

CVE-2018-0802 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy