Microsoft warns of Windows zero-day
The Windows flaw could allow hackers to gain user data, but nothing in the wild has been seen yet.
Microsoft has warned of a Windows zero-day vulnerability, affecting all versions of the operating system.
The Redmond giant said it had seen a proof-of-concept attempting to exploit the vulnerability, which could conceivably harm Internet Explorer users on Windows.
Nothing has been seen yet in the wild.
The flaw resides in the MIME Encapsulation of Aggregate HTML protocol handler, used by applications to render certain kinds of documents.
"An attacker could construct an HTML link designed to trigger a malicious script and somehow convince the targeted user to click it," Angela Gunn, from Microsoft's Trustworthy Computing division, hypothesised in a blog post.
"When the user clicked that link, the malicious script would run on the user's computer for the rest of the current Internet Explorer session. Such a script might collect user information (e.g. email), spoof content displayed in the browser, or otherwise interfere with the user's experience."
A patch has not yet been offered but Microsoft has issued a workaround in its advisory for administrators to ensure nothing goes awry.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"The workaround we are recommending customers apply locks down the MHTML protocol and effectively addresses the issue on the client system where it exists," Gunn added.
"We are providing a Microsoft Fix-it package to further automate installation."
Microsoft did not confirm when a patch would be released, but said it was working on an update to address the vulnerability.
Just earlier this month, Microsoft warned about yet another zero-day flaw affecting Windows.
The vulnerability, affecting the Windows Graphics Rendering Engine, could have allowed malware to be installed on a computer if users viewed a malicious image in a browser or document.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
TD Synnex launches white-label cloud storefronts for UK&I partnersNews The distributor said the move will help channel partners grow recurring revenue streams and expand their cloud services businesses
-
MSPs and resellers positioned to drive shift to remediation-first exposure managementIndustry Insights MSPs drive shift to remediation-first exposure management beyond vulnerability tracking.
-
Anthropic targets vulnerability detection gains with Claude Security public beta — here's what users can expectNews The Claude Mythos developer is aiming for a more limited approach to cyber tooling for public consumption
-
Researchers warn millions of RDP and VNC servers are wide open to exploitationNews Researchers at Forescout spotted millions of RDP and VNC servers exposed online
-
Brace yourselves for a vulnerability explosion, Forescout warnsNews AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Organizations hit by 90 zero-day vulnerabilities last yearNews Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
