Blog

Pay attention to Makafie's latest loophole "CVE-2021-40444", Makafeberg report

About this article

 There is a lot of information about important vulnerabilities in the world, and this short error report outlines the latest vulnerabilities, which is worth noting. For many years, our team did not rely on a single scoring system (such as CVSS) and made qualitative analysis based on experience. We will study the characteristics of worm possibility, uneven distribution of targets, possible abuse and impact. Now, we will focus on CVE-2021-40444.

CrossView:CVE-2021-40444

About CVE-2021-40444

 CVE-2021-40444 is a vulnerability in Office applications that use protected views such as Word, PowerPoint, and Excel. Allows an attacker to execute remote code (RCE). CVE-2021-40444 is a vulnerability that allows you to launch specially crafted ActiveX controls and malicious MS cabinet (.cab) files from Office documents.

 Most importantly, the vulnerability affects the application itself and the preview pane of the Resource Manager (Windows Explorer/File Explorer).

Reasons to pay attention to

 Many people who are using or installing Microsoft Office applications should be worried.

 Office is one of the most widely used applications on earth. You may also be opening Office now. Many enterprises disable macros in Office documents at the group policy level, but I don't think ActiveX is treated the same way. In other words, if the data is not properly managed, many Office users will be exposed to this vulnerability.

 Fortunately, email providers mark malicious files (at least known PoC) as potential malware and remove them as attachments. As a result, compared with technology, "spray and pray" e-mail campaigns rarely take advantage of this loophole to spread.

Prevent the abuse of loopholes

 It's not impossible to do it. By default, Windows uses a flag called Mark of the Web (MoTW) to enable Office protection mode. The MoTW flag is set in email attachments and network downloads to prevent network operations, ActiveX controls, and macros embedded in the document from being executed in protected mode, thus preventing malicious exploitation of this vulnerability.

 However, users are used to displaying protected messages and often turn off the display regardless of the results. Attackers can take advantage of this common human response to risk the target machine because they may install malware without proper confirmation.

 In addition, the Office application itself or the explorer preview pane may be utilized, but the preview pane in Outlook works in a completely different way and therefore will not be abused. Why there is such a difference can only be explained by Microsoft, that is, Outlook users must explicitly open malicious files in order to be abused. The more steps a user takes to open a malicious file, the less likely it is to be abused.

The cause of the problem

 The situation is completely different, depending on how the file is delivered and where the user saves it.

 In addition to email and network downloads, there are many ways to get files, including camera flash cards, Sam drives, and external hard drives. Files opened from these sources (and many common applications [1]) do not have the MoTW flag set. That is, attackers can send malicious files through .7z archives or send them as part of a disk image, or discard USB flash drives on the channel, avoiding protection altogether. Persuading users to open such files is not as difficult as other social engineering strategies.

 Another way to avoid default protection is to use e-mail or downloaded RTF files. According to our tests, MoTW does not apply to RTF files saved from email attachments, but can be used as a carrier. I don't know if RTF files will be the first choice for this abuse.

Abstract: abstract.

マカフィー 最新の脆弱性「CVE-2021-40444」に注目、マカフィーバグレポート

 The details described above are important things you must read. If you just want to know how to deal with this loophole, please read the mitigation measures below.

Mitigation measures.

 As of September 14, 2021, please apply the patch provided in Windows Update. At present, it is the best solution.

 Enable the registry solution and disable ActiveX. The details are listed in Microsoft bulletin, and you can effectively disable abuse until the formal patch is applied.

 Make sure that the Preview pane in Explorer (Windows Explorer/File Explorer) is disabled (invalid by default). It only protects you from attacks using the explorer preview pane. If you open a file outside protected mode (such as a RTF file) or explicitly disable protected mode, it will be abused.

Reference standard

 McAfee Enterprise supports situations where patching cannot be performed or there is no production environment patching cycle. The KB we provide covers the entire protection and detection technology stack for endpoints (ENS Expert Rules), network (NSP), and EDR.

https://kc.mcafee.com/corporate/index?page=content&id=KB94876

[1] 7zip, files from disk images or other container formats, FAT formatted volumes, etc.

The content of this page is the following McAfee Enterprise Blog content updated on September 17, 2021 (US time). Original text: The Bug Report | September 2021:CVE-2021-40444 author: Kevin McGrath,Eoin Carroll,Steve Povolny

Related websites.

Hot Articles

How to Save Websites as PDF on iPhone or PC | Business Insider Japan

How to Save Websites as PDF on iPhone or PC | Business Insider Japan

Sign up for a free e-mail newsletter We'll send you a Business Insider Japan e-mail newsletter at 17:00 on weekdays. Check the terms of use You can save the website as a PDF from various web browsers including Safari on iPhone. Photo: Takuma Imamura Web page suddenly ...

READ MORE READ MORE
Yahoo! News Digitalizing the traditional "small pattern dyeing" pattern Crisis of disappearance, challenge of long-established president

Yahoo! News Digitalizing the traditional "small pattern dyeing" pattern Crisis of disappearance, challenge of long-established president

In the file in front of Mr. Atsushi Tomita, a well-preserved paper pattern is included so that it is not exposed to the air as much as possible. To prepare for digitization and prevent deterioration = Taken by Hiroyuki Kondo on the morning of December 10, 2021 at Tomita Dyeing Crafts in Shinjuku-ku, Tokyo ...

READ MORE READ MORE
 It's okay if you forget to record the news!How to see the famous scenes of the Olympics later on your smartphone

It's okay if you forget to record the news!How to see the famous scenes of the Olympics later on your smartphone

Explaining how to use the archive distribution The Tokyo Olympics attracts attention not only for players' play but also for unique commentary. Even if you miss it even though it became a hot topic, or if you did not record it, you can do it at your favorite timing later ...

READ MORE READ MORE

Related Articles