Macro Systems Blog
A Vulnerability in Microsoft's MSHTML You Need to be Aware of
A vulnerability in Microsoft’s MSHTML browser engine has been found and tracked by Kaspersky. It is being exploited all over the world right now. How can you avoid this vulnerability so that it doesn’t affect your business?
What is MSHTML?
MSHTML is the browser engine that is located within the personal computer and server unit versions of Windows. The vulnerability itself can be found in just about any device that runs most versions of the Windows operating system. Industries most impacted by this vulnerability include telecommunications, medical technology, industry, energy, banking, and research and development.
How Does the Exploit Work?
The vulnerability itself is easy to exploit; all it needs is for someone to send an infected Office file to a user. Once the file is downloaded, it runs code and executes the payload, infecting the target machine. Kaspersky claims that attackers can then use ActiveX to perform even more attacks, like downloading backdoors onto the infected system. This is especially devastating if the hacker can gain administrative privileges by attacking, say, the network or system administrator for your systems.
What Can Be Done About It?
MSHTML has been patched by Microsoft, but if you have yet to download the patch, you can simply not download the infected Microsoft Office document. Plus, you should never download a suspicious or unknown file in the first place. Now, applying patches and not downloading suspicious files might sound like best practices—and they are—so make sure that you are following them and not putting your company at unnecessary risk.
By working with Macro Systems, you can ensure that patches get applied in a timely manner. Moreover, you can get all of the security solutions and training needed to maximize network security. To learn more, reach out to us at 703-359-9211.
Comments