Home / CVE DB / CVE-2015-2503
Standard
Vulnerability Identifier

CVE-2015-2503

2015-11-11
Severity Assessment
LOW
CVSS v3.x Score
Clinical Analysis (Description)

Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Microsoft Office Elevation of Privilege Vulnerability."

Vector Sequencing

Attack Parameters

Impact Consequences

Technical Impact

CVSS v2 Score (Legacy)
9.3

For backward compatibility

EPSS Probability
15.49%

Percentile: 94.7%

Weakness Classification

CWE-CWE-264

Affected Population

Affected Configurations

Total: 39 detected entries

Software List Scrollable
mi
powerpoint
Vendor: microsoft • v2016
mi
excel
Vendor: microsoft • v2007
mi
access
Vendor: microsoft • v2007
mi
project_server
Vendor: microsoft • v2010
mi
powerpoint
Vendor: microsoft • v2013
mi
publisher
Vendor: microsoft • v2013
mi
word
Vendor: microsoft • v2013
mi
project
Vendor: microsoft • v2016
mi
infopath
Vendor: microsoft • v2007
mi
powerpoint
Vendor: microsoft • v2010
mi
skype_for_business
Vendor: microsoft • v2016
mi
word
Vendor: microsoft • v2007
mi
onenote
Vendor: microsoft • v2007
mi
lync
Vendor: microsoft • v2013
mi
infopath
Vendor: microsoft • v2013
mi
office_2007_ime
Vendor: microsoft • vsp3
mi
access
Vendor: microsoft • v2016
mi
project
Vendor: microsoft • v2007
mi
publisher
Vendor: microsoft • v2016
mi
powerpoint
Vendor: microsoft • v2007
mi
excel
Vendor: microsoft • v2010
mi
excel
Vendor: microsoft • v2013
mi
word
Vendor: microsoft • v2016
mi
publisher
Vendor: microsoft • v2010
mi
project_server
Vendor: microsoft • v2013
mi
onenote
Vendor: microsoft • v2016
mi
visio
Vendor: microsoft • v2010
mi
onenote
Vendor: microsoft • v2013
mi
visio
Vendor: microsoft • v2013
mi
visio
Vendor: microsoft • v2016
mi
visio
Vendor: microsoft • v2007
mi
excel
Vendor: microsoft • v2016
mi
access
Vendor: microsoft • v2013
mi
word
Vendor: microsoft • v2010
mi
onenote
Vendor: microsoft • v2010
mi
infopath
Vendor: microsoft • v2010
mi
publisher
Vendor: microsoft • v2007
mi
access
Vendor: microsoft • v2010
mi
pinyin_ime
Vendor: microsoft • v2010
Timeline

Time Line

PUBLICATION
11 Nov 2015
MODIFICATION
12 Apr 2025
Impact Statistics

Key Metrics

CVSS Score
LOW
Products
39
Affected
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.