To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious Office file.

To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious Office file.