- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
Technical contribution by Palo Alto Networks Security Architects Yarden Altmann and Ben Melamed.
There's a new Playbook for MSHTML Zero-Day Vulnerability (CVE-2021-40444)— aka Microsoft's MSHTML Remote Code Execution Vulnerability.
CVE-2021-4044 is a Zero-Day Vulnerability with the MSHTML engine that has been found vulnerable to arbitrary code execution by a specially crafted Microsoft Office document or rich text format file.
At the time of publishing, a patch does not exist for this vulnerability—but an exploit sample is publicly available and is being actively exploited in the wild. Attackers using this vulnerability can run malicious code on the victim’s endpoint through malformed Office documents.
As part of our Rapid Breach Response program Cortex XSOAR released a new pack and a playbook to handle this vulnerability: CVE-2021-40444 - MSHTML RCE.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
2 Likes | |
1 Like | |
1 Like | |
1 Like | |
1 Like |
User | Likes Count |
---|---|
3 | |
2 | |
2 | |
1 | |
1 |