A new zero-day vulnerability in Windows • Blisstech Solutions

Introduction

A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document, and can be used to target users across all versions of Windows. Microsoft has yet to release a patch for the vulnerability, so users are advised to exercise caution when opening Word documents from untrusted sources.

What is a zero-day vulnerability and why should I care about it

A zero-day vulnerability is a security hole in software that is unknown to the vendor. These vulnerabilities are highly prized by hackers, as they can be used to exploit systems using vulnerabilities that are yet unknown and are not patched.

Zero-day vulnerabilities are a serious threat to users, as they can be used to exploit systems without the user’s knowledge. In the case of the Windows Search vulnerability, a malicious script can be embedded in a Word document which, when opened by the user, will automatically open a search window containing remote-hosted malware executables. The malware then proceeds to infect the user’s machine.

The exploit in Windows Search and how it works

Windows Search is a built-in search feature in Windows that allows users to search for files and folders on their computer. The Windows Search vulnerability discovered by security researchers can be combined with another zero-day (CVE-2022-30190) and allows attackers to exploit the feature to automatically open a malicious search window containing remotely-hosted malware executables.

The exploit is activated when a user opens a Word document containing a malicious script. When the document is opened, the script automatically runs and opens a search window containing remote-hosted malware executables.

The impact of the exploit

Windows Search is a crucial component of the Windows operating system, used by millions of users every day to find files and folders on their computers. The vulnerability can be triggered by just previewing an Office document, and can be used to target users across all versions of Windows.

The recent discovery of a zero-day vulnerability in Windows Search has raised concerns among security experts, as the exploit can be used to automatically open a malicious search window containing remotely-hosted malware executables.

Using social engineering, the attackers would entice the user to run the malware by claiming they are critical updates or something else that creates a sense of urgency. Then the malware would proceed to infect the user’s machine.

How to protect yourself from the exploit

There are a few things you can do to protect yourself from the Windows Search exploit:

  • Do not open, or even preview, Office documents from untrusted sources.
  • Make sure your antivirus software is up-to-date.
  • Do not use an admin account for day to day activity. Admin rights are needed by most malware, so removing admin rights is one of the best forms of protection.
  • Educate your users on this threat and the risks.

In Conclusion

The recent discovery of a zero-day vulnerability in Windows Search has raised concerns among security experts, as the exploit can be used to automatically open a malicious search window containing remotely-hosted malware executables.

The exploit is triggered when a user launches an Office document, and can be used to target users across all versions of Windows. Microsoft has yet to release a patch for the vulnerability, so users are advised to exercise caution when opening Office documents from untrusted sources.

By following the security measures outlined above, you can help protect yourself and your organization from this dangerous exploit.

Want to discuss your businesses cybersecurity with an expert?  Why not get in touch?

More Content

WAIT sign on British road crossing

How to delay Windows 10 updates

It is an undisputed fact that, to keep your computer secure, you should keep the software running on it up to date.  We go on about it again and again and again.  However, there is a balance between making sure that you have the latest Windows 10 updates, and also...

How to Secure Your Business from Cyber Threats in 2024: A Free Guide

Protect your business from these cybersecurity threats in 2024 We’re weeks away from the new year. And this is a great time to start thinking about what needs to get better in 2024. We believe you should allocate more of your business’s precious resources to the...

Zoom wants to be the new Teams

Zoom is looking for a piece of the MS Teams action with the launch of a whole suite of features and services

Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for to stop your business’s data (and profits) falling into the wrong hands…

How a strategic IT advisor pays for themselves

Does your IT support service help your business grow? Or is it just fixing things when they break? If your current approach is all panic, invoices, and short-term fixes, it’s time for a rethink. A strategic IT advisor becomes a true partner in business growth, helping...

Secure your data under lock and key

Your business's data is invaluable. Without it, you wouldn’t have much of a business, would you? So that data must be kept safe… and one of the best ways to do that is to encrypt it. That way, even if a cybercriminal gets their hands on it, your data is worthless to...
What’s your business’s view on Return to Office?

What’s your business’s view on Return to Office?

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this right now… here are some important considerations before you decide what’s best for your team.

The Microsoft sign on a building

Microsoft urge users to patch against critical vulnerability

Microsoft is warning of a recently discovered critical Windows DNS Server vulnerability that is described as “wormable”. DNS (Domain Name Services) is used by computers all over the world to find each other. The Internet could not work without it. Microsoft DNS is...
Better battery life for Windows 11 laptops

Better battery life for Windows 11 laptops

Wish your laptop could last longer on a single charge? Big changes could be on the way that help your team work smarter (and stress less about finding outlets).
Learn more about this business-boosting improvement from Microsoft and Windows 11…

Tech Tip: How to create private Teams and channels

Welcome to a new Tuesday tech tip video. This one shows you how to create private Teams and channels in Microsoft Teams. Microsoft Teams is a powerful tool for collaboration, but how do you limit access to what people can see? The answer: Private Teams and private...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05