The vulnerability enables hackers to obtain personal data by using a specially created file
Microsoft has issued a warning about a critical zero-day vulnerability in its Office suite that poses a significant risk of unauthorized data exposure. The vulnerability, identified as CVE-2024-38200 and with a CVSS score of 7.5, is a spoofing vulnerability that impacts many Office versions, including Office 2016, Office LTSC 2021, Microsoft 365 Apps for Enterprise, and Office 2019 in both 32-bit and 64-bit versions.
The vulnerability, which was found by researchers Jim Rush and Metin Yunus Kandemir, enables hackers to obtain personal data by using a specially created file. This might happen if a person is deceived by phishing or social engineering techniques into opening a compromised file or visiting a malicious website. Microsoft has identified a temporary fix through Feature Flighting as of July 30, 2024, and a formal patch is expected on August 13 as part of the monthly Patch Tuesday updates. Despite the vulnerability being classified with an "Exploitation Less Likely" assessment, Microsoft advises all users to implement the forthcoming patch for full protection. In the interim, Microsoft recommends several mitigation strategies. These include configuring network security settings to restrict NTLM traffic, adding users to the Protected Users Security Group to block NTLM authentication, and blocking TCP port 445/SMB outbound traffic using firewalls and VPN settings.
is disclosure comes as Microsoft is also addressing two other zero-day vulnerabilities that threaten to undermine the security of updated Windows systems. Additionally, recent findings have revealed new methods attackers use to bypass Windows security controls, emphasizing the need for vigilant cybersecurity practices.
.webp)



























.webp)