PatchSiren cyber security CVE debrief
CVE-2023-23391 Microsoft CVE debrief
CVE-2023-23391 is a Microsoft Office for Android spoofing vulnerability with a medium CVSS score of 5.5. The NVD record shows a user-interaction-dependent issue that can affect integrity, with no listed confidentiality or availability impact. Microsoft’s MSRC advisory is the primary vendor reference for remediation. For defenders, the main concern is Android deployments of Microsoft Office, especially where app versions are centrally managed and users may trust the app interface to represent content or identity accurately. The NVD record specifically identifies the vulnerable Android CPE for Microsoft Office, indicating that update verification should focus on Android builds rather than desktop Office installations.
- Vendor
- Microsoft
- Product
- Microsoft Office for Android
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-03-14
- Original CVE updated
- 2024-11-21
- Advisory published
- 2023-03-14
- Advisory updated
- 2024-11-21
Who should care
Organizations and users running Microsoft Office for Android, especially in managed mobile fleets where app versions are centrally deployed and trust in the app UI matters.
Technical summary
NVD classifies CVE-2023-23391 as CVSS 3.1 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N. That means the issue requires user interaction, has no privileges required, and is primarily an integrity problem. NVD also lists a vulnerable Microsoft Office Android CPE: cpe:2.3:a:microsoft:office:16.0.16026.20172:*:*:*:*:android:*:*.
Defensive priority
Medium priority. Update Microsoft Office for Android promptly, validate that managed devices are not pinned to the vulnerable build, and use the Microsoft advisory as the authoritative remediation source.
Recommended defensive actions
- Review the Microsoft MSRC advisory for CVE-2023-23391 and apply the recommended update path for Office for Android.
- Check managed Android app deployments to confirm Office for Android is not running the vulnerable build identified by NVD.
- Prioritize updates on devices where Office is used to view or share trusted business content.
- Communicate to users that this issue involves spoofing and depends on user interaction, so visual trust cues should not be taken at face value until patched.
Evidence notes
Official sources provided in the corpus include the CVE record, the NVD detail page, and Microsoft’s MSRC advisory. The NVD metadata lists the CVSS vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N and identifies the vulnerable Android CPE cpe:2.3:a:microsoft:office:16.0.16026.20172:*:*:*:*:android:*:*. The record was published on 2023-03-14 and later modified on 2024-11-21. NVD also lists Microsoft’s MSRC advisory as the patch/vendor reference.
Official resources
-
CVE-2023-23391 CVE record
CVE.org
-
CVE-2023-23391 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
CVE-2023-23391 was published on 2023-03-14. The NVD record was later modified on 2024-11-21; that modified date is record maintenance, not the vulnerability issue date. Microsoft’s MSRC advisory is linked as the official vendor reference.