Attackers are actively exploiting a Microsoft remote code execution vulnerability using malicious Office files, the tech giant has warned. The vulnerability known as CVE-2021-40444 affects Windows Servers from version 2008 and Windows 7 through 10. What attackers are doing is sending potential victims an Office file and tricking them into opening it. That file automatically opens Internet Explorer to load the bad actor’s web page, which has an ActiveX control that downloads malware onto the victim’s computer.
Several security researchers reported the zero-day attacks to Microsoft. One of them, Haifei Li of EXPMON, told BleepingComputer that the method is 100 percent reliable — all it would take to infect a system is for the victim to open the malicious file. In Li’s case, the attack they came across used a .DOCX document. Microsoft has yet to roll out a security patch for the vulnerability, but it has published mitigation methods to prevent infection.
The tech giant says Microsoft Defender Antivirus and Microsoft Defender for Endpoint can both detect the vulnerability and prevent infection, so users need to keep them updated and running. Further, it advises disabling all ActiveX controls in Internet Explorer to render it inactive for all websites. Microsoft’s security warning contains information how to do that, which involves updating IE’s registry and rebooting the computer.
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.