GADGETS

Microsoft is releasing a zero-day exploitation patch that uses malicious Office files


Microsoft has just unveiled an update that fixes 66 security vulnerabilities as part of this month’s Patch Tuesday. One addresses a critical zero-day vulnerability that hackers are actively exploiting using Office files that contain malicious ActiveX controls. A few days ago, Microsoft issued a warning about the flaw after it was notified by security researchers who discovered that bad actors were exploiting it to defraud potential victims to open malicious Office files. Once opened, the file automatically launches a page in Internet Explorer that contains an ActiveX control that downloads malware to the victim’s computer.

When Microsoft issued the alert, it still had no solution and only asked users to check if Microsoft Defender Antivirus or Microsoft Defender for Endpoint were enabled. Both programs can detect attempts to exploit vulnerabilities. He also advised users to disable all ActiveX controls in Internet Explorer. The vulnerability known as CVE-2021-40444 affects Windows servers from versions 2008 and Windows 7 to 10. Security researchers have proven that the exploit is 100 percent reliable and that all it takes to infect a computer is to open a file sent by a hacker. The new update will now ensure that the error can no longer be exploited.

In addition to the patch for CVE-2021-40444, the update fixes two other critical flaws. As the Registry notes, it fixes two remote code execution vulnerabilities for Windows WLAN AutoConfig Service and Open Management Infrastructure.

All products recommended by Engadget have been selected by our editorial team, independent of our parent company. Some of our stories involve partnerships. If you purchase something through one of these links, we can earn a commission for affiliates.



Source link

Naveen Kumar

Friendly communicator. Music maven. Explorer. Pop culture trailblazer. Social media practitioner.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button