CVE-2021-25633
📋 TL;DR
This vulnerability allows attackers to create digitally signed LibreOffice documents that appear valid but contain manipulated content unrelated to the displayed signature. By tampering with certificate data in document signature files, attackers can trick users into trusting malicious documents. This affects LibreOffice users running versions 7.0 prior to 7.0.6 and 7.1 prior to 7.1.2.
💻 Affected Systems
- LibreOffice
📦 What is this software?
Libreoffice by Libreoffice
Libreoffice by Libreoffice
⚠️ Risk & Real-World Impact
Worst Case
Attackers distribute malicious documents that appear legitimately signed by trusted entities, leading to malware installation, data theft, or credential harvesting when users open them.
Likely Case
Phishing campaigns using seemingly legitimate signed documents to trick users into executing malicious macros or revealing sensitive information.
If Mitigated
Users verify document authenticity through additional channels, limiting damage to isolated incidents with minimal data exposure.
🎯 Exploit Status
Exploitation requires creating a malicious document but doesn't require special privileges. Attackers need to convince users to open the document.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: LibreOffice 7.0.6 or 7.1.2
Vendor Advisory: https://www.libreoffice.org/about-us/security/advisories/CVE-2021-25633
Restart Required: No
Instructions:
1. Download latest version from libreoffice.org. 2. Install over existing installation. 3. Verify version with 'libreoffice --version' (Linux) or Help > About (Windows/macOS).
🔧 Temporary Workarounds
Disable macro execution
allPrevent malicious macros from running even if document is opened
Tools > Options > Security > Macro Security > Set to 'Very High' (disable all macros)
Use alternative office software
allTemporarily use patched versions or alternative software for opening ODF documents
🧯 If You Can't Patch
- Educate users to verify document authenticity through separate channels before trusting signatures
- Implement email filtering to block ODF documents from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check LibreOffice version: On Linux/macOS run 'libreoffice --version', on Windows check Help > About. If version is 7.0.0-7.0.5 or 7.1.0-7.1.1, system is vulnerable.
Check Version:
libreoffice --version
Verify Fix Applied:
Confirm version is 7.0.6 or higher, or 7.1.2 or higher. Test by opening known good signed documents to ensure signature validation works properly.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed signature validations
- Unexpected certificate combinations in document signatures
Network Indicators:
- Unusual ODF document downloads from external sources
- Documents with modified signatures.xml files
SIEM Query:
source="libreoffice" AND (event="signature_validation_failed" OR event="certificate_mismatch")