A new zero-day vulnerability in Windows • Blisstech Solutions

Introduction

A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document, and can be used to target users across all versions of Windows. Microsoft has yet to release a patch for the vulnerability, so users are advised to exercise caution when opening Word documents from untrusted sources.

What is a zero-day vulnerability and why should I care about it

A zero-day vulnerability is a security hole in software that is unknown to the vendor. These vulnerabilities are highly prized by hackers, as they can be used to exploit systems using vulnerabilities that are yet unknown and are not patched.

Zero-day vulnerabilities are a serious threat to users, as they can be used to exploit systems without the user’s knowledge. In the case of the Windows Search vulnerability, a malicious script can be embedded in a Word document which, when opened by the user, will automatically open a search window containing remote-hosted malware executables. The malware then proceeds to infect the user’s machine.

The exploit in Windows Search and how it works

Windows Search is a built-in search feature in Windows that allows users to search for files and folders on their computer. The Windows Search vulnerability discovered by security researchers can be combined with another zero-day (CVE-2022-30190) and allows attackers to exploit the feature to automatically open a malicious search window containing remotely-hosted malware executables.

The exploit is activated when a user opens a Word document containing a malicious script. When the document is opened, the script automatically runs and opens a search window containing remote-hosted malware executables.

The impact of the exploit

Windows Search is a crucial component of the Windows operating system, used by millions of users every day to find files and folders on their computers. The vulnerability can be triggered by just previewing an Office document, and can be used to target users across all versions of Windows.

The recent discovery of a zero-day vulnerability in Windows Search has raised concerns among security experts, as the exploit can be used to automatically open a malicious search window containing remotely-hosted malware executables.

Using social engineering, the attackers would entice the user to run the malware by claiming they are critical updates or something else that creates a sense of urgency. Then the malware would proceed to infect the user’s machine.

How to protect yourself from the exploit

There are a few things you can do to protect yourself from the Windows Search exploit:

  • Do not open, or even preview, Office documents from untrusted sources.
  • Make sure your antivirus software is up-to-date.
  • Do not use an admin account for day to day activity. Admin rights are needed by most malware, so removing admin rights is one of the best forms of protection.
  • Educate your users on this threat and the risks.

In Conclusion

The recent discovery of a zero-day vulnerability in Windows Search has raised concerns among security experts, as the exploit can be used to automatically open a malicious search window containing remotely-hosted malware executables.

The exploit is triggered when a user launches an Office document, and can be used to target users across all versions of Windows. Microsoft has yet to release a patch for the vulnerability, so users are advised to exercise caution when opening Office documents from untrusted sources.

By following the security measures outlined above, you can help protect yourself and your organization from this dangerous exploit.

Want to discuss your businesses cybersecurity with an expert?  Why not get in touch?

More Content

Tech Tip: How to Provide Remote Support for FREE with Quick Assist

This Two Minute Tech Tip shows you how to view or control someone else's screen for FREE. As an IT managed service provider we have lots of tools we have to pay for to help us support our clients. However, if you've ever been in a situation where you are trying to...

Bring Your Own Device: Dos and don’ts for your business

Do you let employees use their own phones, laptops, or tablets for work? That includes things like sending a quick email or updating a client account. If you do, it’s important to remember that personal devices often lack the security measures of work-issued devices....
AI audio translation previews in Microsoft Edge

AI audio translation previews in Microsoft Edge

A new AI upgrade in your Edge browser could remove language barriers and make global content instantly accessible. Here’s how…

Tech Tip: How to use Windows Clipboard History

Welcome to a new Tuesday tech tip video where I will show you a really cool Windows feature called Clipboard History. Do you ever find yourself copying and pasting the same text or images over and over again? If so, you're not alone. But there's a better way! Windows...

How a strategic IT advisor pays for themselves

Does your IT support service help your business grow? Or is it just fixing things when they break? If your current approach is all panic, invoices, and short-term fixes, it’s time for a rethink. A strategic IT advisor becomes a true partner in business growth, helping...

Tech Tip: How to create a table of content in Word

Happy Tuesday everyone! Today's Two Minute Tech Tip was an idea given to me by my apprentice, George Borns. When asked what would be a good idea for a Tech Tip and without hesitation, George said "What about headings and tables of content in Word?" It is a great tip...

Why you’re better off in a contract with your IT company

Imagine this: Your business stops working due to a tech issue like malware, data loss or computer malfunction, resulting in a loss of productivity and revenue.  Now, think about your current IT support situation. Do you have an IT support contract, or do you only call...

When can you finally forget your password?

Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.

Tech Tip: What is Autosave and Version History?

This is the latest Tuesday Two Minute Tech-tip that explains the AutoSave and Version History features of Office 365. When we migrate businesses to Microsoft 365 and they start working with OneDrive and SharePoint, I often hear the question, "How do I save my files...

What to do when disaster strikes: Creating an Incident Response Plan

Your business has firewalls, the latest security software, multi-factor authentication, and, of course, uncrackable passwords. You may even have Cyber Essentials—high five. But… It’s still not enough to protect you from 100% of cyber attacks. Completely watertight...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05