CVE-2021-28453

7.8 HIGH

📋 TL;DR

CVE-2021-28453 is a remote code execution vulnerability in Microsoft Word that allows attackers to execute arbitrary code by tricking users into opening specially crafted documents. This affects users of Microsoft Word on Windows systems. Successful exploitation requires user interaction but can lead to full system compromise.

💻 Affected Systems

Products:
  • Microsoft Word
  • Microsoft Office
Versions: Microsoft Word 2016, 2019, and Microsoft 365 Apps prior to May 2021 updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit versions. Microsoft 365 Apps for Enterprise are affected. Requires user interaction to open malicious document.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious document. Proof-of-concept code has been publicly disclosed. The vulnerability has been actively exploited in targeted attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in May 2021 (KB5001342 for Office 2016, KB5001347 for Office 2019)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28453

Restart Required: Yes

Instructions:

1. Open Microsoft Word. 2. Go to File > Account > Update Options > Update Now. 3. Alternatively, download and install the May 2021 security updates from Microsoft Update Catalog. 4. Restart the system after installation.

🔧 Temporary Workarounds

Disable Protected View for Internet files

windows

Configure Word to open files from the Internet in Protected View to prevent automatic code execution

Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\Word\Security" -Name "ProtectedView" -Value 1

Block Office macros from the Internet

windows

Prevent Office from running macros in documents downloaded from the Internet

Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\Word\Security" -Name "BlockInternetMacros" -Value 1

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables from running
  • Use Microsoft Office Viewer or web-based Office applications to open untrusted documents

🔍 How to Verify

Check if Vulnerable:

Check Word version in File > Account > About Word. If version is older than May 2021 updates, system is vulnerable.

Check Version:

powershell "Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*' | Where-Object {$_.DisplayName -like '*Word*'} | Select-Object DisplayName, DisplayVersion"

Verify Fix Applied:

Verify Word version shows May 2021 or later updates installed. Check Windows Update history for KB5001342 or KB5001347.

📡 Detection & Monitoring

Log Indicators:

  • Word process spawning unexpected child processes
  • Unusual Office document opening events from untrusted sources
  • Windows Event Log ID 4688 with Word as parent process

Network Indicators:

  • Outbound connections from Word process to suspicious IPs
  • DNS queries for command and control domains from Office processes

SIEM Query:

source="windows" (process_name="WINWORD.EXE" AND child_process!="explorer.exe") OR (event_id=4688 AND parent_process_name="WINWORD.EXE")

🔗 References

📤 Share & Export