A new zero-day vulnerability in Windows • Blisstech Solutions

Introduction

A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document, and can be used to target users across all versions of Windows. Microsoft has yet to release a patch for the vulnerability, so users are advised to exercise caution when opening Word documents from untrusted sources.

What is a zero-day vulnerability and why should I care about it

A zero-day vulnerability is a security hole in software that is unknown to the vendor. These vulnerabilities are highly prized by hackers, as they can be used to exploit systems using vulnerabilities that are yet unknown and are not patched.

Zero-day vulnerabilities are a serious threat to users, as they can be used to exploit systems without the user’s knowledge. In the case of the Windows Search vulnerability, a malicious script can be embedded in a Word document which, when opened by the user, will automatically open a search window containing remote-hosted malware executables. The malware then proceeds to infect the user’s machine.

The exploit in Windows Search and how it works

Windows Search is a built-in search feature in Windows that allows users to search for files and folders on their computer. The Windows Search vulnerability discovered by security researchers can be combined with another zero-day (CVE-2022-30190) and allows attackers to exploit the feature to automatically open a malicious search window containing remotely-hosted malware executables.

The exploit is activated when a user opens a Word document containing a malicious script. When the document is opened, the script automatically runs and opens a search window containing remote-hosted malware executables.

The impact of the exploit

Windows Search is a crucial component of the Windows operating system, used by millions of users every day to find files and folders on their computers. The vulnerability can be triggered by just previewing an Office document, and can be used to target users across all versions of Windows.

The recent discovery of a zero-day vulnerability in Windows Search has raised concerns among security experts, as the exploit can be used to automatically open a malicious search window containing remotely-hosted malware executables.

Using social engineering, the attackers would entice the user to run the malware by claiming they are critical updates or something else that creates a sense of urgency. Then the malware would proceed to infect the user’s machine.

How to protect yourself from the exploit

There are a few things you can do to protect yourself from the Windows Search exploit:

  • Do not open, or even preview, Office documents from untrusted sources.
  • Make sure your antivirus software is up-to-date.
  • Do not use an admin account for day to day activity. Admin rights are needed by most malware, so removing admin rights is one of the best forms of protection.
  • Educate your users on this threat and the risks.

In Conclusion

The recent discovery of a zero-day vulnerability in Windows Search has raised concerns among security experts, as the exploit can be used to automatically open a malicious search window containing remotely-hosted malware executables.

The exploit is triggered when a user launches an Office document, and can be used to target users across all versions of Windows. Microsoft has yet to release a patch for the vulnerability, so users are advised to exercise caution when opening Office documents from untrusted sources.

By following the security measures outlined above, you can help protect yourself and your organization from this dangerous exploit.

Want to discuss your businesses cybersecurity with an expert?  Why not get in touch?

More Content

Is app overload slowing down your team?

Is app overload slowing down your team?

How many different apps and chat services are your employees juggling every day? Chances are, it’s making your business less productive. Good news: There’s a simple solution. We have the details.

OneDrive Backup Tip Video Thumbnail

Tech Tip: Using OneDrive to automate backups

Happy Tuesday everyone! Today's Tech Tip is a tip on how to use OneDrive to automate the backup of Known Folders. Known Folders are what Microsoft call your Documents, Desktop and Pictures folders in your Windows profile. If you are like most people, you will accept...
Windows 11 on a Laptop Screen

What’s coming in Windows 11?

Microsoft has just announced (in a typically 'West Coast'​ way) what's coming in Windows 11.  Here is a rundown of what was announced at the event. Windows 11 Interface Design The first impression visually is that it looks kind of like Linux merged with Mac OSx. The...
A mailbox with NO SPAM written on it

Spam emails are losing your business hundreds of hours every year

Spam emails: Very annoying and everyone hates them! They take up your time and make it hard for you to get other work done! A recent study found that each one of our employees could be losing 80 hours per year due the hassle associated with managing spam. That’s a LOT...

Tech Tip: How to create private Teams and channels

Welcome to a new Tuesday tech tip video. This one shows you how to create private Teams and channels in Microsoft Teams. Microsoft Teams is a powerful tool for collaboration, but how do you limit access to what people can see? The answer: Private Teams and private...

Everything you need to know about password managers for your business

If you’re confused about password managers, you’re not alone. A password manager is software that generates safe passwords, remembers them, and auto-fills logins for you. That saves time. But means your business can quickly lock out staff when they leave. Some people...

Outsourcing always beats DIY

Do you ever feel like you're juggling ten tasks at once to keep your business running? Marketing, sales, finances, IT… the list goes on! And somewhere in that chaos, your dreams for growth get lost. Enter Dave, a fellow entrepreneur who has created the same...
Don’t think your business is a target? Think again

Don’t think your business is a target? Think again

Cyber criminals are targeting businesses of all sizes, all the time. And new research shows just how they’re doing it. We tell you how to stay protected.

Tech Tip: How to Sync Teams Files to Your Computer

Hello everyone, welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you use Microsoft 365?    👉 Do you need to collaborate on documents with your colleagues?    👉 Do you want to do this using the same familiar Windows...

Cut the Jargon! The top 3 things you should discuss with your IT partner

IT support involves technical tasks, and the language used in this field can be quite technical at times. Therefore, we have created a plain language guide that focuses on the three key areas you should discuss with your technology partner. Contact us if you want to...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05