Remote Code Execution vs AV:L: Why “remote” still means local file-triggered RCE

  • Thread Author
A digital visualization related to the article topic.
Yes — the apparent mismatch comes from Microsoft using two different layers of description.
The CVSS field AV:L is describing the attack vector in scoring terms: the exploit has to be triggered through a local file-processing path on the victim machine, usually by opening or otherwise handling a crafted PowerPoint file. That is why Microsoft’s guidance can still describe the issue as a Remote Code Execution vulnerability: the attacker can be remote from the victim, while the vulnerable code executes locally on the victim system. Microsoft has used this same pattern in other Office advisories, where a malicious file delivered over email or the web leads to code execution when a user opens it, even though the CVSS attack vector is local rather than network-based ]
In other words, “remote” in the title does not mean the exploit primitive is network-reachable. It means the attacker can cause code to run on a machine they do not physically control. CVSS, by contrast, is being more precise about how the vulnerability is triggered: through local interaction with a file or application on the target endpoint. Microsoft’s own Security Update Guide documentation explicitly treats the CVE title as a concise vulnerability description, while CVSS attack vector is one component of the broader scoring model
So the practical translation is:
  • Remote attacker
  • Local execution path
  • Remote code execution outcome
That is why these Office buerstood as remote delivery, local execution problems. The attacker does not need to sit at the victim’s keyboard, but the victim still has to open or process the malicious content for the exploit to fire
Your note about “Arbitrary Code Execution” is also reasonable as a plain-English description, but Microsoft’s official title sticks with Remote Code Execution because that is the standard security classification for bugs that let an attacker cause code to run on a target system. The distinction is mostly about scoring mechanics versus business impact, not about whether the attacker is physically local.

Source: MSRC Security Update Guide - Microsoft Security Response Center
 

Back
Top