MS Office ActiveX CVE-2021-40444 summary:
🎯No macros needed - normal detections & mitigations fail.
🎯No word from MS on patch ETA
🎯Can in some cases be executed in Explorer Preview mode. (RTF older O365 client?) - h/t -
1/x
🎯Defender defs of 1.349.22.0+ (9/2) should catch it if AV is used. MS Identifies as O97M/Donoff.SA (may be ways to mitigate detection)
🎯These are normal docx files & not anything special.
🎯Supposedly Protected mode and/or App Guard will prevent it.
2/x
🎯Potentially up to 1 month of history of general exploitation. h/t-
🎯You can find history of execution in the HKCU hive and payload/c2. h/t-
3/x
🎯Microsoft can detect it for Defender but has not openly shared this with other AV vendors at this time.
🎯Samples out there are dropping CobaltStrike Beacons going back at least 1 week. h/t -
4/x
🎯Does not require ActiveX so is not fixed by the mitigation in MS's CVE Bulletin - h/t -
🎯Multiple detections out there or in the works -

github.com/SigmaHQ/sigma/…
5/x
Thank you to the community for sharing all the info above!!! This is far worse than I think most people realize and I am seriously considering blocking all docx at the edge until Microsoft can patch this. Be safe out there and I hope this summary helps you!
6/6
Another update from Microsoft on the original bulletin which now includes disabling the shell extension for previewing in Explorer: msrc.microsoft.com/update-guide/v…
It also includes the advice to use GPO settings to disable the installation of signed or unsigned ActiveX controls. This seems well and good combined with disabling the shell extension for previews in Explorer but I am not sure this covers all ways this can be exploited. Hmm

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Joseph Roosen

Joseph Roosen Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(