Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0792 and Microsoft Common Vulnerabilities and Exposures CVE-2018-0797.

Note To apply this security update, you must have the release version of Office Online Server installed on the computer.

How to get and install the update

Method 1: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 2: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More Information

Security update deployment information

For deployment information about this update, see security update deployment information: January 18, 2018.

Security update replacement information

This security update replaces previously released security update KB 4011021.

File hash information

Package Name

Package Hash SHA 1

Package Hash SHA 2

wacserver2016-kb4011022-fullfile-x64-glb.exe

34FD293C0E3E85AD3399D20B15515F0CFB5D8761

787D00AA4DD1AF9FB7E01E8A30063C036ED017FF1E8AB8C79A900EF7DB8B4FF1

File information

For the list of files that cumulative update 4011022 contains, download the file information.

How to get help and support for this security update

Help for installing updates: Windows Update FAQ

Security solutions for IT professionals: Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

Propose a feature or provide feedback on SharePoint: SharePoint User Voice portal

Need more help?

Expand your skills

EXPLORE TRAINING >

Get new features first

JOIN MICROSOFT INSIDERS >

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×