WARNING: Microsoft Office Critical Zero-Day Vulnerability, Patch Still Pending!
Microsoft has disclosed a critical zero-day vulnerability affecting Office 2016 and later versions, for which a patch is yet to be released.
Identified as CVE-2024-38200, this vulnerability stems from an information disclosure flaw
The zero-day vulnerability affects various 32-bit and 64-bit versions of Office, including Office 2016, Office 2019, Office LTSC 2021, and Microsoft 365 Apps for Enterprise.
Despite Microsoft's assessment that the likelihood of exploiting CVE-2024-38200 is low, MITRE has classified the potential for exploitation of this type of vulnerability as highly probable.
In a scenario where the attack is web-based, an attacker might host or utilize a compromised website that accepts user-provided content, embedding a specially crafted file designed to exploit the vulnerability. However, the attacker cannot force users to visit the site; instead, they must entice the user to click a link—often through an email or instant message—and then convince them to open the malicious file.
Microsoft is currently working on security updates
Microsoft recommends three key mitigation strategies
Recommended by LinkedIn
More Information Expected at Defcon
While Microsoft has not released specific details about the flaw, its discovery has been credited to Jim Rush, a security consultant
According to Peter Jakowetz, Managing Director at PrivSec, Rush will provide more insights into this vulnerability during his upcoming Defcon talk titled "NTLM - The Last Ride." Rush plans to delve into several newly disclosed bugs, including methods for bypassing existing fixes, and explore some unexpected discoveries and critical issues.
Rush also intends to highlight defaults in certain libraries or applications that should not exist, along with gaps in Microsoft's NTLM-related security measures.
In addition to addressing this zero-day flaw, Microsoft is also working on fixing other vulnerabilities, including those that could potentially "unpatch" current Windows systems, reintroducing previously resolved vulnerabilities. The company also mentioned its ongoing consideration to patch a Windows Smart App Control and SmartScreen bypass that has been exploited since 2018.
Sicherheit ist nur eine Illusion. Absolute Sicherheit ist eine absolute Illusion.
5moEndlich mal ein Auftrag, der nicht an die #Nachtschicht geht sondern an die #Tagschicht oder wie gruppiert man das #Management ein? Liebe CEOs und sonstigen Entscheider. #Microsoft steht auf der Liste der Firmen,die sichere Software generieren ganz sicher mit drauf. Ich checke gerade wo und bin auf Seite 872 meiner Endlosdrucke. Anscheinend stehen sie nicht so weit vorn mit drauf. Update kommt, wenn ich sie gefunden habe.
Cybersecurity GRC Risk Leader | Women’s ERG Co-Lead | Thought Leader | WOC STEM Tech Rising Star | Girls Inc DC Woman of Impact | Strategy Execution Specialist | Mentor | Career Coach | SAIC Brand Ambassador
5moGood to know!
Cloud Technical Sales | Distinguished Quantum Ambassador | PhD in Physics presso IBM
5moGo multicloud and try AnyCloud Office356 Backup as a Service on IBM Cloud marketplace! Differentiation is makes the difference in these situations.
Lead DevOps Engineer | Cloud Solutions Architect | Security Expert
5moVery informative
Research, … Learning, … Thxs
5moIk houd dit in gedachten !