Description

Microsoft has disclosed a critical zero-day vulnerability in Office. The vulnerability tracked as CVE-2024-38200 with a CVSS score of 7.5. All spoofing flaws have impacted several versions of Microsoft Office including Microsoft Office 2016(32-bit, and 64-bit), Microsoft Office LTSC 2021(32-bit, and 64-bit), Microsoft 365 Apps for enterprise(32-bit, and 64-bit) and Microsoft Office 2019 (32-bit, and 64-bit). The vulnerability discovered and reported by the researchers Jim Rush and Yunus Kandemir. In a web-based attack, adversaries exploit this flaw by enticing cloud users to visit deceptive websites or download malicious files from compromised sites. While the attacker cannot force the user to visit the site, they may use social engineering tactics such as enticing emails or messages to achieve this. Microsoft plans to release a formal patch for CVE-204-38200 on August 13 as part of its patch Tuesday updates. An interim fix was made available via Feature Flighting on July 30, 2024. Users are advised to update the final patch for comprehensive protection. Microsoft also highlighted that all supported versions of Microsoft Office and Microsoft 365 are currently protected with the interim fix. In addition, Microsoft is addressing two other zero-day vulnerabilities with CVE -204-38202 and CVE- 2024-21302 that cloud allow exploitation of updated Windows systems. Meanwhile, Elastic Security Labs has uncovered methods used by attackers to bypass Windows smart App control and smart screen warnings, including a technique known as LNK stomping which has been actively exploited for over six years.