iTnews

New ActiveX Windows zero-day exploited: Microsoft alert

By Juha Saarinen on Sep 8, 2021 6:28AM
New ActiveX Windows zero-day exploited: Microsoft alert

Take care opening Office docs until patch arrives next week.

A new zero-day vulnerability in the Trident MSHTML rendering engine for Windows is currently being exploited in targeted attacks, Microsoft has warned.

The company has received and confirmed reports that an attacker can write an ActiveX control, a now deprecated software framework that has been plagued by security issues, which can be deployed through malicious Microsoft Office documents.

Users would then be asked to open a Microsoft Office document that hosts the browser rendering engine to execute the malicious code.

Microsoft rates the vulnerability as 8.8 out of 10 on the Common Vulnerabilities Scoring System version 3.0, and said the attack complexity is low with proof-of-concept code being available.

The success of the attack depends on the privileges of the logged-in user being tricked into opening the malicious Office documents, with administrators being most at risk.

Microsoft's Protected View or Application Guard, which are used when opening Office documents from the internet, both prevent the attack.

Users who have auto-updated the Microsoft Defender Antivirus and Defender for Endpoints anti-malware software are also protected.

It is also possible to disable ActiveX controls on individual systems, to foil the attack.

At this stage, it is not known who is behind the attacks or what the malicious payload is.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
activexmicrosoftofficesecuritysoftware

Partner Content

How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
Sep 8 2021
6:28AM
0 Comments

Related Articles

  • Heroku hackers got account passwords via OAuth token theft
  • Patch now against Linux 'Nimbuspwn' root priv-esc bugs
  • Stolen Heroku and Travis-CI OAuth tokens used for GitHub repo hacks
  • Local Gits vulnerable to remote code execution
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Macquarie Bank creates a broker portal on Salesforce

Macquarie Bank creates a broker portal on Salesforce

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.