Microsoft patches exploited 'Follina' remote code exec bug

By
Follow google news

Office vulnerability abused to drop malware.

The Follina vulnerability in Microsoft Office that has been exploited by attackers to plant remote access tools like Qbot and AsyncRAT is now fixed in the latest set of Patch Tuesday security updates.

Microsoft patches exploited 'Follina' remote code exec bug

Follina uses a uniform resource locator (URL) calling from Office applications like Word, to remotely execute code, and compromise victim computers.

"An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application", Microsoft said in its advisory.

"The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights".

This month's Patch Tuesday addresses 55 vulnerabilities in the Windows operating system and sub-components, as well as Microsoft Office, and several other apps.

Three of the 55 vulnerabilities are rated as critical.

They affect Windows, and allow for remote code execution in the Network File System (NFS) version 4.1 component, the lightweight directory access protocol (LDAP) implementation, and the Hyper-V hypervisor.

None of the three are known to be exploited in the wild.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Attacker embeds Claude Code in mass credential harvesting op

Attacker embeds Claude Code in mass credential harvesting op

Log In

  |  Forgot your password?