Microsoft disclosed a new 0-day vulnerability (CVE-2021-40444) which is being actively exploited in the wild. In the initial analysis, it said that the flaw could be used to hijack vulnerable Windows systems with weaponized Microsoft Office documents. It’s all our responsibility to be protected from 0-day MSHTML remote code execution vulnerability. Let’s see how to fix the CVE-2021-40444 MSHTML Remote Code Execution vulnerability on Windows machines.
CVSS SCORE: 8.8
This remote code execution vulnerability existing in the browser engine of the Internet Explorer named ‘MSHTML’, which is also used to render web content on Word, Excel, and PowerPoint documents.
Microsoft says that “An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.”
You can see Microsoft’s Exploitability index for this vulnerability is being tracked here.
Microsoft didn’t disclose more information about attack vectors, targets, and the identity of the adversaries exploiting this 0-day MSHTML Remote Code Execution vulnerability.
Microsoft has released the fix in its September 2021 security updates. Installing the updates should be the first step to fix the CVE-2021-40444 MSHTML vulnerability.
The best way to mitigate attacks targeting CVE-2021-40444 MSHTML vulnerability is, disable the installation of all ActiveX controls in Internet Explorer. You can disable ActiveX controls by updating these registries.
Microsoft’s native antimalware solutions ‘Microsoft Defender Antivirus’ and ‘Microsoft Defender for Endpoint’ are capable of detecting the vulnerability. Microsoft Defender for Endpoint recognizes the vulnerability as “Suspicious Cpl File Execution”.
Block all Office applications from creating child processes by enabling attack surface reduction rule “BlockOfficeCreateProcessRule” on Microsoft Defender.
Microsoft Office’s security features ‘Protected View‘ or ‘Application Guard‘ can prevent attacks targeted CVE-2021-40444 MSHTML Remote Code Execution vulnerability.
This can also be mitigated by disabling ActiveX on the internet explorer.
Turn on automatic updates on your personal computers. or install the latest security updates as soon as they become available.
It’s always best practice to run the latest version of operating system with latest patch.
It’s must to regularly update your anti-virus or endpoint security clients to cover rapidly evolving attacker tools and techniques. We recommand to have cloud based machine learning protection which identities and blocks the majority of new and unknown threats.
It is important to ensure tamper protection is turnd-on on your endpoint client application.
No additional action is required against the vulnerability for the users who always keep their Windows Environment up to date.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
"1001"=dword:00000003
"1004"=dword:00000003
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1]
"1001"=dword:00000003
"1004"=dword:00000003
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2]
"1001"=dword:00000003
"1004"=dword:00000003
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
"1001"=dword:00000003
"1004"=dword:00000003
Please read the post: “How to quickly find and fix vulnerabilities on Windows in no time?”
Copy the registry information from the previous section to a text file and save the file with the .reg extension.
Apply registry setting to your policy hive just by double-clicking on the file.
Reboot the system to save the new configuration on the system.
Navigate to Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page.
Select the zone Internet Zone.
Double-click Download signed ActiveX controls and Enable the policy. Then set the option in the policy to Disable.
Double-click Download unsigned ActiveX controls and Enable the policy. Then set the option in the policy to Disable.
Repeat the task with Intranet Zone, Local Machine Zone, or Trusted Sites Zone.
Note: These registry changes may cause serious problems. It may require you to reinstall your operating system. If you want to roll back the changes. Just delete all the four registry keys or set them to the original value before the changes were applied.
Thanks for reading this post. We believe it’s our responsibility to share the post which helps to secure the digital world. Please share this post with others and help to create awareness against cyber threats.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.