To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious Office file. – Read More