MS Office ActiveX CVE-2021-40444 summary:
🎯No macros needed - normal detections & mitigations fail.
🎯No word from MS on patch ETA
🎯Can in some cases be executed in Explorer Preview mode. (RTF older O365 client?) - h/t -
Thank you to the community for sharing all the info above!!! This is far worse than I think most people realize and I am seriously considering blocking all docx at the edge until Microsoft can patch this. Be safe out there and I hope this summary helps you!
6/6
Another update from Microsoft on the original bulletin which now includes disabling the shell extension for previewing in Explorer: msrc.microsoft.com/update-guide/v…
It also includes the advice to use GPO settings to disable the installation of signed or unsigned ActiveX controls. This seems well and good combined with disabling the shell extension for previews in Explorer but I am not sure this covers all ways this can be exploited. Hmm
• • •
Missing some Tweet in this thread? You can try to
force a refresh