Microsoft warns of Windows zero-day
The Windows flaw could allow hackers to gain user data, but nothing in the wild has been seen yet.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Microsoft has warned of a Windows zero-day vulnerability, affecting all versions of the operating system.
The Redmond giant said it had seen a proof-of-concept attempting to exploit the vulnerability, which could conceivably harm Internet Explorer users on Windows.
Nothing has been seen yet in the wild.
The flaw resides in the MIME Encapsulation of Aggregate HTML protocol handler, used by applications to render certain kinds of documents.
"An attacker could construct an HTML link designed to trigger a malicious script and somehow convince the targeted user to click it," Angela Gunn, from Microsoft's Trustworthy Computing division, hypothesised in a blog post.
"When the user clicked that link, the malicious script would run on the user's computer for the rest of the current Internet Explorer session. Such a script might collect user information (e.g. email), spoof content displayed in the browser, or otherwise interfere with the user's experience."
A patch has not yet been offered but Microsoft has issued a workaround in its advisory for administrators to ensure nothing goes awry.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"The workaround we are recommending customers apply locks down the MHTML protocol and effectively addresses the issue on the client system where it exists," Gunn added.
"We are providing a Microsoft Fix-it package to further automate installation."
Microsoft did not confirm when a patch would be released, but said it was working on an update to address the vulnerability.
Just earlier this month, Microsoft warned about yet another zero-day flaw affecting Windows.
The vulnerability, affecting the Windows Graphics Rendering Engine, could have allowed malware to be installed on a computer if users viewed a malicious image in a browser or document.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Are small language models finally having their moment?In-depth The smallest AI models can be run on a mobile phone or laptop – what's the business potential?
-
‘Reducing reliance on foreign tech infrastructure is key’ to European tech success – and its long-term survivalNews MEPs have once again called for decreased reliance on foreign tech infrastructure
-
Organizations hit by 90 zero-day vulnerabilities last yearNews Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
