Applies ToOffice Professional Plus 2016 Office Professional 2016 Office Standard 2016 Office Home and Business 2016 Office Home and Student 2016

Summary

This security update resolves aremote code execution vulnerability that exists if Microsoft Office incorrectly loads arbitrary type libraries. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2020-0760.

Note To apply this security update, you must have the release version of Office 2016 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see What version of Office am I using?).

Known issues

  • Issue 1 Symptom Some types of Visual Basic for Applications (VBA) references might be affected by this update. For more information, see FAQ for VBA solutions affected by April 2020 Office security updates.Status This change in behavior is caused by a design change in Office. The new behavior is by design. Therefore, a fix is not necessary and no mitigation will be provided.

  • Issue 2 Symptom Consider the following scenario:

    • You open an Excel workbook.

    • The workbook has VBA macros.

    • The macros contain references that include DBCS (double-byte) characters.

    In this scenario, you may receive the following error message after this update is installed:

    The Visual Basic for Applications (VBA) macro in this workbook is corrupt and has been removed. Macro corruption may exist in the current file. To recover the macro, please open a backup copy of this file.

    Fix To fix this issue, install KB 3101353.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: April 14, 2020.

Security update replacement information

This security update replaces previously released security update 3115135.

File hash information

File name

SHA1 hash

SHA256 hash

vbe72016-kb3128012-fullfile-x64-glb.exe

E5422C809CB0222A004F0C1E50D98A9566C5A146

17C6965EA53A23C8862A9C3990D1CB97704571EA229F0959C3906B0B2C1D0090

vbe72016-kb3128012-fullfile-x86-glb.exe

0B84FCC504A78F053601FCB413C20FF883020AEA

1EB6EC36C04FF789778A8D2B91670CA31BA0E334D6BB6F64CDBCF727E3BDE91F

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

File identifier

File name

File version

File size

Date

Time

vbe7.dll

vbe7.dll

7.01.1096

2712656

21-Mar-20

02:45

File identifier

File name

File version

File size

Date

Time

vbe7.dll

vbe7.dll

7.01.1096

4504144

21-Mar-20

02:24

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.