Windows MSHTML zero-day defenses bypassed as new info emerges (2024)

Windows MSHTML zero-day defenses bypassed as new info emerges (1)

New details have emerged about the recent Windows CVE-2021-40444 zero-day vulnerability, how it is being exploited in attacks, and the threat actor's ultimate goal of taking over corporate networks.

This Internet Explorer MSHTML remote code execution vulnerability, tracked as CVE-2021-40444, wasdisclosed by Microsoft on Tuesdaybut with few details as it has not been patched yet.

The only information shared by Microsoft was that the vulnerability uses malicious ActiveX controls to exploit Office 365 and Office 2019 on Windows 10 to download and install malware on an affected computer.

Since then, researchers have found the malicious Word documents used in the attacks and have learned new information about how the vulnerability is exploited.

Why theCVE-2021-40444 zero-day is so critical

Since the release of this vulnerability, security researchers have taken to Twitter to warn how dangerous it is even though Microsoft Office's 'Protected View' feature will block the exploit.

When Office opens a document it checks if it is tagged with a "Mark of the Web" (MoTW), which means it originated from the Internet.

If this tag exists, Microsoft will open the document in read-only mode, effectively blocking the exploit unless a user clicks on the 'Enable Editing' buttons.

Windows MSHTML zero-day defenses bypassed as new info emerges (2)

As the "Protected View" feature mitigates the exploit, we reached out toWill Dormann, a vulnerability analyst for CERT/CC, to learn why security researchers are so concerned about this vulnerability.

Dormann told BleepingComputer that even if the user is initially protected via Office's 'Protected View' feature, history has shown that many users ignore this warning and click on the 'Enable Editing' button anyway.

Dormann also warns that there are numerous ways for a document not to receive the MoTW flag, effectively negating this defense.

"If the document is in a container that is processed by something that is not MotW-aware, then the fact that the container was downloaded from the Internet will be moot. For example, if 7Zip opens an archive that came from the Internet, the extracted contents will have no indication that it came from the Internet. So no MotW, no Protected View."

"Similarly, if the document is in a container like an ISO file, a Windows user can simply double-click on the ISO to open it. But Windows doesn't treat the contents as having come from the Internet. So again, no MotW, no Protected View."

"This attack is more dangerous than macros because any organization that has chosen to disable or otherwise limit Macro execution will still be open to arbitrary code execution simply as the result of opening an Office document." - Will Dormann

To make matters even worse, Dormann discovered that you could use this vulnerability in RTF files, which do not benefit from Office's Protected View security feature.

Inspired by @buffaloverflow, I tested out the RTF attack vector. And it works quite nicely.
WHERE IS YOUR PROTECTED MODE NOW? pic.twitter.com/qf021VYO2R

— Will Dormann (@wdormann) September 9, 2021

Microsoft has also shared mitigations to prevent ActiveX controls from running in Internet Explorer, effectively blocking the current attacks.

However, security researcher Kevin Beaumont has alreadydiscovered a wayto bypass Microsoft's current mitigations to exploit this vulnerability.

With these bypasses and additional use cases, CVE-2021-40444 has become even more severe than initially thought.

How CVE-2021-40444 is currently used in attacks

While we do not have the actual phishing emails used in the attacks, Beaumont has analyzed the malicious Word document to understand better how the exploit works.

Looks like this has been in the wild for a week or more. Uses the daft as F feature that allows Word to load a template from internet, that spawns IE and then trusts JS and ActiveX controls, then uses ../.. (yes it's 1999) to spawn .cpl file https://t.co/mOvaN9YLj6 pic.twitter.com/xLf2jVWyY5

— Kevin Beaumont (@GossiTheDog) September 8, 2021

One of the known malicious Word attachments used in the attacks is named 'A Letter before court 4.docx' [VirusTotal] and claims to be a letter from an attorney.

Since the file was downloaded from the Internet, it will be tagged with the 'Mark of the Web' and opened in Protected View, as shown below.

Windows MSHTML zero-day defenses bypassed as new info emerges (3)

Once a user clicks on the 'Enable Editing' button, the exploit will open an URL using the 'mhtml' protocol to a 'side.html' [VirusTotal] file hosted at a remote site, which is loaded as a Word template.

As 'mhtml' URLs are registered to Internet Explorer, the browser will be started to load the HTML, and its obfuscated JavaScript code will exploit the CVE-2021-40444 vulnerability by creating a malicious ActiveX control.

Windows MSHTML zero-day defenses bypassed as new info emerges (4)

This ActiveX control will download a ministry.cab [VirusTotal] file from a remote site, extracta championship.inf [VirusTotal] file (actually a DLL), and executeit as a Control Panel 'CPL' file, as illustrated in the image below from a Trend Micro report.

Windows MSHTML zero-day defenses bypassed as new info emerges (5)

TrendMicro states that the ultimate payload is installing a Cobalt Strike beacon, which would allow the threat actor to gain remote access to the device.

Once the attacker gains remote access to victims' computers, they can use it to spread laterally throughout the network and install further malware, steal files, or deploy ransomware.

Due to the severity of this vulnerability, it is strongly advised that users only open attachments unless they come from a trusted source.

While Microsoft's Patch Tuesday is next week, it is unclear if Microsoft will have enough time to fix the bug and adequately test it by then.

Related Articles:

Windows MSHTML zero-day used in malware attacks for over a year

Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days

Microsoft discloses Office zero-day, still working on a patch

Windows Update downgrade attack "unpatches" fully-updated systems

Telegram zero-day allowed sending malicious Android APKs as videos

Windows MSHTML zero-day defenses bypassed as new info emerges (2024)

FAQs

What is Windows zero-day vulnerability? ›

This zero-day vulnerability allows attackers with administrator privileges to elevate their access by replacing current versions of Windows system files with outdated, vulnerable ones.

What is the Windows MSHTML platform? ›

MSHTML (also known as Trident) is the proprietary browser engine of Microsoft's Internet Explorer web browser. It debuted with the release of Internet Explorer 4 in 1997.

What is zero-day malware attack? ›

Zero day malware is malware that exploits unknown and unprotected vulnerabilities. This novel malware is difficult to detect and defend against, making zero day attacks a significant threat to enterprise cybersecurity.

What is firewall zero-day threats? ›

A zero-day exploit (also called a zero-day threat) is an attack that takes advantage of a security vulnerability that does not have a fix in place.

How do you mitigate zero-day vulnerability? ›

Perform Rigorous Patch Management

Patch management is the process by which you identify and then address bugs or harmful code in your IT systems—either of which leaves you vulnerable to a zero-day attack. Companies must install a robust patch management policy and process that align employees, IT, and security teams.

Why are zero-day vulnerabilities a problem? ›

Because they were discovered before security researchers and software developers became aware of them—and before they can issue a patch—zero-day vulnerabilities pose a higher risk to users for the following reasons: Cybercriminals race to exploit these vulnerabilities to cash in on their schemes.

What is MSHTML used for? ›

MSHTML is a software component used to render web pages on Windows. Although it's most commonly associated with Internet Explorer, it is also used in other software including versions of Skype, Microsoft Outlook, Visual Studio, and others.

What is the vulnerability of MSHTML platform spoofing? ›

What is the Vulnerability? CVE-2024-38112 is a spoofing vulnerability in Windows MSHTML Platform. The attacker can abuse internet shortcuts and Microsoft protocol handlers to execute malicious code.

What is the use of MSHTML DLL? ›

dll file is a part of the Internet Explorer web browser and is used to render HTML pages. It's normal to have multiple versions of mshtml. dll installed on your system, especially if you have multiple versions of Internet Explorer installed. In your case, you have two versions of mshtml.

What is the most famous zero-day exploit? ›

One of the most famous examples of a zero-day attack was Stuxnet. First discovered in 2010 but with roots that spread back to 2005, this malicious computer worm affected manufacturing computers running programmable logic controller (PLC) software.

Which of the following is an example of a zero-day vulnerability? ›

Imagine that an offender figures out that hammering the locker in a certain way can break it open. You come to know about this flaw but as yet you do not have a fix for this. It is an example of zero day vulnerability.

How common are zero day attacks? ›

Researchers from Google on Wednesday said they observed 97 zero-days exploited in the wild in 2023, compared to 62 in 2022 — a 50 percent increase.

What is Microsoft zero-day vulnerability? ›

A zero-day vulnerability is a flaw in software for which no official patch or security update has been released. A software vendor may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.

Why is zero-day malware a strong weapon for hackers? ›

The term zero-day indicates that the vendor has had zero days to address the issue. Cybercriminals can exploit these vulnerabilities to compromise systems, steal data, or launch other types of cyberattacks before the vendor becomes aware of the issue and releases a patch. Zero-day attack.

What is a zero click exploit? ›

The attacker can then use this vulnerability to remotely execute malicious code or access sensitive information without any interaction from the user. What is a zero-click attack? A zero-click attack is a type of cyber attack that requires no user interaction to exploit a vulnerability in a device or application.

What is a zero-day vulnerability for dummies? ›

A zero-day vulnerability represents a software flaw unknown to the software vendor or developer. Bad actors exploit zero-days, often causing significant damage before detection.

Which describes a zero-day vulnerability? ›

A zero-day vulnerability is a software vulnerability discovered by attackers before the vendor has become aware of it. Because the vendors are unaware, no patch exists for zero-day vulnerabilities, making attacks likely to succeed.

What is a famous zero-day vulnerability? ›

Attack #1 – Sony Zero-Day Attack

One of the most famous zero-day attacks was launched in 2014 against Sony Pictures Entertainment. Through a specific unknown exploit, a team of hackers silently crept into Sony's network and got access to all vital information quickly.

What is Windows vulnerability? ›

A vulnerability window refers to the period of time between when a vulnerability is first exploited and when software developers start to develop and publish a countermeasure to that threat. It is the time frame during which attackers can take advantage of the vulnerability before a fix is available.

References

Top Articles
„Barbie 2“: Kommt eine Fortsetzung? Das sagen Greta Gerwig und Margot Robbie zu Teil 2
The Miss R Project: Why Did the Viral TikTok Teacher Get Fired? - New Gadget Zone
Nullreferenceexception 7 Days To Die
Whas Golf Card
Access-A-Ride – ACCESS NYC
Mate Me If You May Sapir Englard Pdf
Craigslist Mpls Mn Apartments
Hotels Near 500 W Sunshine St Springfield Mo 65807
Samsung 9C8
Music Archives | Hotel Grand Bach - Hotel GrandBach
Amateur Lesbian Spanking
Unit 1 Lesson 5 Practice Problems Answer Key
Oppenheimer Showtimes Near Cinemark Denton
Rachel Griffin Bikini
Gem City Surgeons Miami Valley South
Google Flights Missoula
Sonic Fan Games Hq
Driving Directions To Bed Bath & Beyond
Vintage Stock Edmond Ok
Wgu Academy Phone Number
Vivaciousveteran
Kirsten Hatfield Crime Junkie
Papa Johns Mear Me
Penn State Service Management
Cvs Sport Physicals
Airg Com Chat
Elanco Rebates.com 2022
Wells Fargo Bank Florida Locations
Grays Anatomy Wiki
The value of R in SI units is _____?
Leland Nc Craigslist
Kelsey Mcewen Photos
New York Rangers Hfboards
Reading Craigslist Pa
Jewish Federation Of Greater Rochester
Wisconsin Women's Volleyball Team Leaked Pictures
Hometown Pizza Sheridan Menu
Frommer's Philadelphia & the Amish Country (2007) (Frommer's Complete) - PDF Free Download
Me Tv Quizzes
Electronic Music Duo Daft Punk Announces Split After Nearly 3 Decades
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Payrollservers.us Webclock
Brother Bear Tattoo Ideas
Fluffy Jacket Walmart
Joblink Maine
Canvas Elms Umd
Erica Mena Net Worth Forbes
Craigslist Psl
Parks And Rec Fantasy Football Names
8663831604
Convert Celsius to Kelvin
OSF OnCall Urgent Care treats minor illnesses and injuries
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 6557

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.