Excel “Remote Code Execution” vs CVSS AV:L: Why They Aren’t Contradictory

  • Thread Author
Microsoft’s naming here is not contradictory once you separate the attack vector from the effect. In CVSS, AV:L means the exploit requires local interaction on the target machine, or a local foothold in the attack path, while Remote Code Execution in Microsoft’s title describes the impact: the vulnerability can be used to run attacker-controlled code on the victim system. Microsoft has used this pattern before in Office and Windows advisories, where the title reflects the end result even when the triggering condition is local or user-mediated.

Background​

Microsoft security advisories often use “Remote Code Execution” as a broad class label for vulnerabilities that let an attacker execute code in the context of the victim process or user. That label does not necessarily mean the attacker reaches the target over the network in a single step. In Microsoft’s own historical guidance, many Office flaws were described as RCE because a malicious file, document, or embedded object could cause code to run when opened, even though the vulnerable operation happened locally on the endpoint.
That distinction matters because CVSS and Microsoft’s bulletin titles solve different problems. CVSS tries to describe exploit conditions and attack route, while Microsoft titles are written for customers scanning a security update guide and need the high-level consequence immediately. So the same issue can be “local” from a vector perspective yet still be called an RCE because the attacker’s goal is to execute arbitrary code on a remote victim system.
This is especially common in Office and document-format vulnerabilities. Microsoft has repeatedly described Excel flaws as remote code execution issues when the trigger was opening a crafted spreadsheet, because the malicious code execution occurs on the victim machine after local parsing of the file. The attacker does not need to sit at the keyboard of the target PC, but the exploit chain may still require the user to open content or perform some local action.
The key idea is that “remote” in RCE is about where the attacker is located relative to the victim, not necessarily about whether the exploit payload arrives over TCP from afar in a single step. That’s why Microsoft’s wording can coexist with AV:L: the attack may need local execution context, user interaction, or a local file-open path, but the result is still code execution on a remote victim system.

What CVSS AV:L Usually Means​

AV:L does not mean “not serious.” It means the exploit path depends on local access, local execution, or local interaction in the sense used by the scoring system. In practice, that often covers cases where the attacker must get a malicious file, link, macro, document, or script onto the target and persuade the user or another process to process it locally.
In Microsoft’s ecosystem, Office vulnerabilities frequently fall into this middle ground. A user opens a file, previews content, or triggers parsing in a trusted application, and the vulnerability is exercised during that local processing step. The attacker may be remote from a human perspective, but the actual trigger happens on the endpoint, which is why the scoring often lands on a local or adjacent vector rather than a purely network one.

Why local vectors still lead to full compromise​

The important nuance is that local attack vector and full code execution are not opposites. A local vector simply says the exploit path is not directly exploitable over the network alone. Once the malicious content is processed, the outcome can still be arbitrary code execution with the victim’s privileges, which is exactly why Microsoft continues to classify many such flaws as RCE.
  • AV:L describes the exploit route.
  • RCE describes the outcome.
  • A file-open or document-parse bug can be both.
  • User interaction often shifts the score without changing the underlying impact.

Why Microsoft Still Calls It Remote Code Execution​

Microsoft’s titles are optimized for impact recognition, not only for CVSS taxonomy. When the company says Remote Code Execution, it is signaling that an attacker can make the victim’s system run code they control, which is the most important business and security outcome for many customers. That is true even if the exploit requires the victim to open a workbook or otherwise trigger local parsing.
This is not unique to Excel. Microsoft described the MSDT vulnerability in 2022 as remote code execution because it allowed arbitrary code to run when triggered from a calling application such as Word, even though the exploit path depended on local application behavior. The same style of description appears in older Office advisories and in other product families where the decisive event occurs on the target device, not on a server in the cloud.

Title labels versus technical scoring​

Microsoft’s bulletin title answers a simple question: what can the attacker ultimately do? CVSS answers a different question: how does the attack have to be carried out? Because those questions are different, the same vulnerability can legitimately be labeled RCE and still carry AV:L in the scoring metadata.
  • Title labels are customer-facing.
  • CVSS vectors are analyst-facing.
  • Both can be correct at the same time.
  • The apparent contradiction is usually just terminology, not substance.

How Excel Vulnerabilities Fit This Pattern​

Excel has a long history of vulnerabilities where opening a crafted spreadsheet leads to code execution. Microsoft has repeatedly treated these as serious execution bugs because the vulnerable parser or object-handling logic runs within the Office process and can be abused to run attacker-supplied code. The user-facing action is local, but the attacker’s control over the content and the resulting compromise make the issue a classic RCE scenario.
In a practical attack chain, the malicious file might arrive by email, cloud share, messaging app, or drive-by download. The actual exploitation still depends on the victim opening or processing it locally, so AV:L can make sense in the scoring model even though the attacker is not physically present. That is why the word Remote in the title should be read as “remote attacker, remote victim” rather than “network-only exploit.”

A useful mental model​

A good way to think about it is this: the attacker can be remote, the malicious content can be remote, but the vulnerability triggers when the content becomes local input on the victim system. At that moment, the code execution happens on the target machine, and from the attacker’s perspective they have achieved remote code execution. That framing is consistent with Microsoft’s historical wording and with how Excel issues have been described in prior advisories.

“Remote” Means the Attacker Is Remote, Not the Trigger​

The biggest source of confusion is the everyday meaning of “remote.” In common speech, people hear “remote code execution” and assume the exploit must be delivered directly over the network. In security terminology, the phrase more often means the attacker can cause code to run on a different machine than their own, which is why Microsoft can use the label for document-based attacks too.
This is why your explanation is directionally correct: the attacker is remote, the victim is local, and the exploit is carried out through a local action on the victim machine. The result is still arbitrary code execution on that victim, so the title is describing the effect, while the CVSS vector is describing the mechanics.

Why terminology matters in incident response​

For defenders, this distinction is more than academic. A vulnerability with AV:L may evade some perimeter controls but can still be highly exploitable through phishing, file sharing, or supply-chain distribution. That is why Excel flaws often require strong endpoint controls, attachment filtering, and macro or Protected View policies rather than just network segmentation.
  • The attacker may be anywhere.
  • The trigger may be local.
  • The compromise can still be remote from the attacker’s viewpoint.
  • Defense has to focus on content inspection and endpoint hardening.

What This Means for Users and Enterprises​

For consumers, the practical warning is simple: do not treat a spreadsheet as harmless just because it looks like a local file. Microsoft’s own history shows that Office documents can be weaponized, and the exploit path often depends on a single click or preview action. That means the right defense is caution, patching, and keeping Office protections enabled.
For enterprises, the issue is broader because Excel is deeply embedded in business workflows. Finance teams, analysts, and operations staff regularly open files from email, shared drives, and collaboration platforms, which makes document-based exploitation a realistic delivery mechanism. Even when a vulnerability is scored locally, the enterprise blast radius can still be wide because the payload rides in through trusted business processes.

Operational implications​

Microsoft’s terminology also hints at where controls should be placed. If the exploit needs local processing, then endpoint detection, file provenance checks, sandboxing, and Office hardening matter more than perimeter firewalls alone. That is one reason why Protected View, attachment filtering, and application isolation remain central controls for Office-related threats.
  • Patch Office and Excel quickly.
  • Keep Protected View and sandboxing features enabled.
  • Restrict unknown file types and legacy formats.
  • Train users not to open unsolicited spreadsheets.
  • Monitor for suspicious document delivery patterns.

Why the CVE Title Can Still Be Technically Accurate​

The title Microsoft Excel Remote Code Execution Vulnerability is technically accurate because the end result is code execution on a remote victim machine. What changes is only the route to that result. CVSS’s AV:L tells you the route is local or requires local action, while Microsoft’s title tells you the vulnerability can be leveraged to execute arbitrary code, which is the critical security outcome.
This is a classic case of taxonomy versus plain-language shorthand. Security teams often say “remote” to describe who is controlling the attack, while scoring systems use “local” to describe where the exploit is triggered. Those are different dimensions, and conflating them makes many Office advisories look contradictory when they are not.

A simple rule of thumb​

If the attacker can make your machine run code, Microsoft may call it RCE even if the trigger is a file you opened locally. If the path requires local execution, user interaction, or an already-footholded session, CVSS may still record AV:L. Both labels can be simultaneously true, and the more important question is often whether the vulnerability is reachable in your environment.

Strengths and Opportunities​

Microsoft’s phrasing, while occasionally confusing, does communicate the most important thing fast: this is a code-execution issue and not just a crash or denial-of-service bug. That helps administrators prioritize patching, especially in environments where Excel is business-critical and file handling is constant. It also reinforces the need for layered controls rather than relying on a single security boundary.
  • Clear impact signal for non-specialist readers.
  • Fast prioritization for patch management teams.
  • Encourages focus on endpoint hardening.
  • Aligns with Microsoft’s long-standing Office security messaging.
  • Helps distinguish serious execution flaws from lesser defects.
  • Supports layered defense, not just network filtering.
  • Makes it easier to spot high-risk document-based attacks.

Risks and Concerns​

The biggest risk is that the wording may cause people to underestimate or overestimate the threat. Some will read AV:L and assume the issue is not remotely exploitable in practice, while others will see Remote Code Execution and assume a pure network worm, which is not necessarily the case here. That mismatch can lead to sloppy prioritization, especially in organizations that rely on automated scoring without reviewing exploit prerequisites.
  • Confusion between exploit vector and impact.
  • Potential underestimation of phishing-based delivery.
  • Overreliance on perimeter defenses that do not help.
  • Legacy file formats and document workflows remain exposed.
  • User interaction can still be the decisive weakness.
  • Security teams may misread urgency if they focus on only one label.
  • Office environments often have broad trust in inbound files.

What to Watch Next​

The most important follow-up is whether Microsoft publishes additional exploitation details, mitigation guidance, or clarifying notes that explain why the CVSS vector was set to local. That kind of nuance often appears after initial publication, especially for Office bugs where preview panes, file-opening paths, or parser behavior shape the score. Security teams should watch for any guidance on protected mode, file-block settings, or specific affected file types.
A second thing to watch is whether security vendors and researchers describe a realistic attack chain that shows how the local trigger is reached. If the path depends on email delivery, preview behavior, or social engineering, then the operational risk may be much higher than the vector label alone suggests. In that case, the vulnerability is locally triggered but still highly relevant for remote attackers targeting users at scale.
  • Microsoft clarification on the attack surface.
  • Any mention of preview pane or open-to-exploit behavior.
  • Updated exploitability or severity notes.
  • Vendor detections and mitigation advice.
  • Proof-of-concept behavior, if published responsibly.
The safest reading today is straightforward: this is an RCE class vulnerability in Excel whose exploitation path is local in CVSS terms, not a contradiction but a distinction. Microsoft is naming the consequence, CVSS is describing the route, and defenders should treat both as true when deciding how urgently to patch and how aggressively to harden Office environments.

Source: MSRC Security Update Guide - Microsoft Security Response Center