Check Point Research (CPR) Identified Four Security Vulnerabilities Affecting Products In The Microsoft Office Suite, Including Excel And Office Online - GADGET-INNOVATIONS

Check Point Research (CPR) Identified Four Security Vulnerabilities Affecting Products In The Microsoft Office Suite, Including Excel And Office Online

Share This




Check Point Research (CPR) Urges Windows Users To Update Their Software, after discovering four security vulnerabilities that affect products in Microsoft Office suite, including Excel and Office online. Rooted from legacy code, the vulnerabilities could have granted an attacker the ability to execute code on targets via malicious Office documents, such as Word, Excel and Outlook.


 

  • Malicious code could have been delivered via Word documents (.DOCX) , Outlook Email (.EML) and most office file formats.
 
  • Vulnerabilities are the result of parsing mistakes made in legacy code, leading CPR to believe security flaws have existed for years
 
  • CPR responsibly disclosed to Microsoft, who then issued fixes: CVE-2021-31174, CVE-2021-31178, CVE-2021-31179, CVE-2021-31939

 

 


 

Check Point Research (CPR) identified four security vulnerabilities affecting products in the Microsoft Office suite, including Excel and Office online. If exploited, the vulnerabilities would grant an attacker the ability to execute code on targets via malicious Office documents, such as Word (.DOCX), Excel (.EXE) and Outlook (.EML). The vulnerabilities are the result of parsing mistakes made in legacy code found in Excel95 File Formats, giving researchers reason to believe that the security flaws have existed for several years.  

 

 

 

Discovery

CPR discovered the vulnerabilities by “fuzzing” MSGraph, a component that can be embedded inside Microsoft Office products in order to display graphs and charts. Fuzzing is an automated software testing technique that attempts to find hackable software bugs by randomly feeding invalid and unexpected data inputs into a computer program, in order to find coding errors and security loopholes. By using the technique, CPR discovered vulnerable functions inside MSGraph. Similar code checks confirmed that the vulnerable function was commonly used across multiple different Microsoft Office products, such as Excel, Office Online Server and Excel for OSX.

 



 

Attack Methodology

 

The vulnerabilities found can be embedded in most Office documents. Hence, there are multiple attack vectors that can be imagined. The simplest one would be:

 

 

  1. Victim downloads a malicious Excel file (XLS format).  The doc can be served via a download link or an email, but the attacker cannot force the victim to download it    
  2. The victim opens the malicious Excel file
  3. The vulnerability is triggered

 

 

 

Since the entire Office suite has the ability to embed Excel objects, this broadens the attack vector, making it possible to execute such an attack on almost any Office software, including Word, Outlook and others.

 

 

 

Responsible Disclosure

 

CPR responsibly disclosed its research finding to Microsoft. Microsoft patched the security vulnerabilities, issuing CVE-2021-31174, CVE-2021-31178, CVE-2021-31179. The fourth patch will be issued on Microsoft’s Patch Tuesday on June 8, 2021, classified as CVE-2021-31939.

 

 

 

How to Update your Windows PC

 

1.  Select the Start button, then select Settings > Update & security > Windows Update.

2.  If you want to check for updates manually, select Check for updates.

3. Select Advanced options, and then under Choose how updates are installed, select Automatic (recommended).