13.6 C
London
Sunday, October 6, 2024

Microsoft Office vulnerability could let hackers take over without users opening a document

A newly discovered zero-day vulnerability in Microsoft Office could allow hackers to take control of your computer, even if you don’t open an infected file. Infected documents use a Word template feature to retrieve an HTML file from a remote web server. This HTML file then loads and executes PowerShell code. PowerShell is a configuration management and task automation program for Windows that can be used to execute administrative tasks.

The problem here is that Microsoft Word executes the malicious code via msdt, which is a support tool. If the malicious document is changed to a Rich Text Format, it runs without the document being opened via the preview tab in Windows File Explorer.

This vulnerability attracted the attention of security researcher Kevin Beaumont, when it was not flagged by Defender for Endpoint, an enterprise security solution from Microsoft.

In a blog post, Beaumont documents how he tested this vulnerability on various different computers and according to him, “it works more common than not.” It was shown to work on Windows 10 even with macros disabled and Microsoft Defender working. The vulnerability appeared to be exploitable using .RTF documents on all versions of Microsoft Office.

Best of Express Premium
Explained: The case for six airbagsPremium
Sri Lanka plans to develop Trincomalee port as industrial hub, stirs glob...Premium
Opinion: Instant justice is a crime that cannot be ignoredPremium
Opinion: A modest, uneven economic recoveryPremium

On May 30, Microsoft ‘s Security Response Center acknowledged the vulnerability and while the company did not yet release a patch, it did list out some workarounds that could protect users’ PCs in the meanwhile.

🚨 Limited Time Offer | Express Premium with ad-lite for just Rs 2/ day 👉🏽 Click here to subscribe 🚨

The first workaround that it recommended was disabling the MSDT URL protocol. This prevents troubleshooters from being launched as links including links throughout the operating system. Even after disabling this, troubleshooters can still be accessed using the “Get Help” application and through system settings. Here is how you can disable the protocol:

  1. Run Command Prompt from the Administrator account
  2. Back up your registry key by executing the command reg export HKEY_CLASSES_ROOT\ms-msdt filename
  3. Execute the command reg delete HKEY_CLASSES_ROOT\ms-msdt /f

Do note that this method requires a certain level of technical knowledge so that you would be able to restore the registry from the saved backup file after.

Thankfully, Microsoft has also mentioned a simpler workaround: to turn on cloud-delivered protection and automatic sample submission on Microsoft Defender Antivirus. Ideally, this would mean that Defender would use artificial intelligence and machine learning to identify and stop new and unknown threats.

Source

Latest news
Related news